General

  • Target

    2024-05-20_341dc3a3c9e87aa3c744f52969edc2e6_cryptolocker

  • Size

    117KB

  • MD5

    341dc3a3c9e87aa3c744f52969edc2e6

  • SHA1

    34b2c3235a714bb17e2b3bb6fa91392e6830f889

  • SHA256

    ba2e700d44a19e783700786cc5a4a5d3f8f8cd934ce4fb1d52d6242de1c07299

  • SHA512

    c452812457549e32b2d7fa91900852b5c7f3353b64070c8c15203e186af1729258eb76c78b71adbfdec617bb04aa671dafb0afe89e380bb8e9949b5f55b3d3ad

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01u:z6a+CdOOtEvwDpjczw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_341dc3a3c9e87aa3c744f52969edc2e6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections