General

  • Target

    2024-05-21_a22f1c6987e7d2e0855c1ceedd1b95ce_cryptolocker

  • Size

    80KB

  • MD5

    a22f1c6987e7d2e0855c1ceedd1b95ce

  • SHA1

    57421c88d70d00c2157aec4fe3c48fa9c427737f

  • SHA256

    2a189aede5349d077dd2a87ecce9ffbd1086796a98f76efde96c05f0cb15eef8

  • SHA512

    993c3ce5ee3d7be5c174a7d75dfe6f5a4abdea102101d1fbbbd2b079bde3810684e72db7dcd939690b5563855a1db7e243962688a2cf2c6b23432ad1944cde78

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqT:T6a+rdOOtEvwDpjNcw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_a22f1c6987e7d2e0855c1ceedd1b95ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections