General

  • Target

    2024-05-15_0dfa653f1f09b6f56d6a475be407262a_cryptolocker

  • Size

    87KB

  • MD5

    0dfa653f1f09b6f56d6a475be407262a

  • SHA1

    06091c17a17770c6defe483596f958c8eed279f6

  • SHA256

    1aa063a537dc703182d60e82049be5314b1a78034d166bd566ca54395a4d5a9e

  • SHA512

    89e83171cf1a01cc1deaac5349ba11a6c045178a11812a6ec7c796f5f323288f9cd6a2998fffb9061bc558b8ed1167fc613b91cb540607be269ec1afb4a177e3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rg:T6a+rdOOtEvwDpjNd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_0dfa653f1f09b6f56d6a475be407262a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections