General

  • Target

    2024-05-21_72905fe082b2a9a7a862e4e65fe42148_cryptolocker

  • Size

    94KB

  • MD5

    72905fe082b2a9a7a862e4e65fe42148

  • SHA1

    025108a28f4a661e23384c5487300e86f3bea5f8

  • SHA256

    3e730cfb3becfacd97d4782015b5a4021c66824d1db667d6a6b01b8caa1c5f8b

  • SHA512

    2239a23a56f44e1a62c7d3788e6b953d96da9c7ede123d2141656e031305699e95545a5ccb40541d651df1dc30d6ce4d8c525a5a31d8134f8e5635f091f85e1f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kW:zCsanOtEvwDpjBx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_72905fe082b2a9a7a862e4e65fe42148_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections