General

  • Target

    2024-05-17_709af4c1f43ef257a551eb9c4288bd32_cryptolocker

  • Size

    78KB

  • MD5

    709af4c1f43ef257a551eb9c4288bd32

  • SHA1

    29188c8ac7659e2b934499016e04a92821c3f8c3

  • SHA256

    040c9f9ba4dcb6eb6488037c1d6a566e0ebbcc2384949dfff9625d3516cd268c

  • SHA512

    0541bb388f4e6a850abb2056041f663bc579761b03acc83dcd86b02d38d90ab9754a2c118536a4f2c9d8fab3dcd251ea484dabed5341c1c958c0075500002c7d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnC:T6a+rdOOtEvwDpjNtHPZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_709af4c1f43ef257a551eb9c4288bd32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections