General

  • Target

    2024-05-23_79812cd4473f1692ab1dd72c07aee83b_cryptolocker

  • Size

    78KB

  • MD5

    79812cd4473f1692ab1dd72c07aee83b

  • SHA1

    b04a89e3c277b9b169e8ce5dbf91b125a698bbd3

  • SHA256

    c2dd730e5a16b0ee55ced6869351ad49f4a640d4ce674bf9bf82e3fff45f0eff

  • SHA512

    38739ced536290583e070d2dadb584700bd6f2bb4c628269744c2e6f96afe5e06e301b1d930443c10036b66375c09b1cb0e0717563d5b0c3086f12a02279b7fb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1Fe:T6a+rdOOtEvwDpjNtHPr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_79812cd4473f1692ab1dd72c07aee83b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections