General

  • Target

    2024-05-15_160a12834390d09bf4819e7999f5aa49_cryptolocker

  • Size

    90KB

  • MD5

    160a12834390d09bf4819e7999f5aa49

  • SHA1

    400dd9e6ade3b1b76d787ea260d448c70bd8fc58

  • SHA256

    04a572f81e5227d062d4d9477857b76ca9828f6e6d0afda8c1f774b1b1b3d489

  • SHA512

    f77c3696fd49e9ecde0122213a0b2b9c81c863e6e829fbbee631c1ff8b7ec77b5781bfbaf1ba10e0926897d8e6e89de8bfe5bce5eefe3009ff18d39432d250ab

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/1:n6a+1SEOtEvwDpjYYvQd2Pe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_160a12834390d09bf4819e7999f5aa49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections