General

  • Target

    2024-05-22_7bd4d24829684d5573d6d517278e87d5_cryptolocker

  • Size

    91KB

  • MD5

    7bd4d24829684d5573d6d517278e87d5

  • SHA1

    760a86061d70940e9ba9ec3f6055c6bdb7ededf6

  • SHA256

    6471e12b134dcd7090d16006f70cc67d1af3cfc2f0781e5e56b5d1758dd5ca6b

  • SHA512

    edc633c47711b6984d9f440501f52a451fc79a0c0602afab650c961feee7327c805fc5315c3be9ff826c515f7cd64bed90eff2a2fa7f67b876b586494058bccc

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Dy:n6a+1SEOtEvwDpjYYvQd2P9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_7bd4d24829684d5573d6d517278e87d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections