General

  • Target

    2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker

  • Size

    97KB

  • MD5

    c55606fd7e7405deb0f826768d539e93

  • SHA1

    a4287cc4eb602d7c5425b487758cbeffa94074cf

  • SHA256

    779e0ec7d4047e0e14662e9a33d27ca0761a6cf7ad3ad806b9db3753745f3178

  • SHA512

    35484c7e687c8a8336843d453e2d46ec361903181b42cfc68edcac951e271e4547d33a709ffbc42c7833025c7295abc0252ee7671c4df23483902fdeadff1c6b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqn:zCsanOtEvwDpjB2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections