General

  • Target

    2024-05-21_323f1881200878d2eaf7ba3baa0b308d_cryptolocker

  • Size

    60KB

  • MD5

    323f1881200878d2eaf7ba3baa0b308d

  • SHA1

    41384c92dd7869a94c39ee7f799753704b0e9942

  • SHA256

    0e308ca2ec460e0e5844171ea3c4e160ac429cc8b3de84187fe5e53e13e45fb6

  • SHA512

    cd60f24a9ce6b5dc60d050da42b32118d3aeaf493cb83369047bba18f0caf66ef6c5caa4212919b102d1c1c1a6497094c31c536027b77bfa1fc36ab9db8e03e7

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3X:z6a+CdOOtEvwDpjQM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_323f1881200878d2eaf7ba3baa0b308d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections