General

  • Target

    2024-05-20_f0d7c697d97b1297f8be0ad97ce86859_cryptolocker

  • Size

    78KB

  • MD5

    f0d7c697d97b1297f8be0ad97ce86859

  • SHA1

    452a1ac4c765ea21bf7c2d57028b45ead320d82f

  • SHA256

    3577852c9a4142c3a76e66f5030903dac0942a66a02d02729f8ef70021cba01e

  • SHA512

    56e3e3d8765917fc4c85dea8c0e336a86d42d6c065b494d76ba2017a3ffb38fe5267ade4f7a0cfb68794e3771f4432f68f9f9e34f41ae18cc906a3df0da327d8

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnI:T6a+rdOOtEvwDpjNtHPf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_f0d7c697d97b1297f8be0ad97ce86859_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections