General

  • Target

    2024-05-22_a72c5b38cb62e0dec5fe46c2a80e01ee_cryptolocker

  • Size

    79KB

  • MD5

    a72c5b38cb62e0dec5fe46c2a80e01ee

  • SHA1

    3027a9d53c99586da78de04a29c01cd339956a9c

  • SHA256

    60802c5e89535593e4ca14baf2cd8dbe45d8b6be6c098d25919892b4d840333a

  • SHA512

    238af1f38a3bcff2628b447091ee229579bd91c6b9b78b9ff3625c60b52e6a4a7604d873a86b83ec3d2b34b415962da3a9002593778e942a08352a63c759d269

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRb:T6a+rdOOtEvwDpjNti

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_a72c5b38cb62e0dec5fe46c2a80e01ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections