General

  • Target

    2024-05-17_3829f7eec8d83187457643ff6e86b6ee_cryptolocker

  • Size

    59KB

  • MD5

    3829f7eec8d83187457643ff6e86b6ee

  • SHA1

    8bd57565ef673717ffd4a2fbc081a4f3de82c776

  • SHA256

    e5786b5b555a394d44c8f8f4cb3c7199472fc3c61baafaf15a04a66c1ba264c9

  • SHA512

    66f90656dcdbe4e8b1e129cdea3ba9233688acc844e9e4ca2fa79dbd52116c77b4288225ac9839240a1db5286a91a33a70c466260c46071829babf8f56cccacc

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pT:H6QFElP6n+gou9cvMOtEvwDpjCpVXt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_3829f7eec8d83187457643ff6e86b6ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections