General

  • Target

    2024-05-23_01531e7bd4fedebfe831ab2ba708d5ee_cryptolocker

  • Size

    78KB

  • MD5

    01531e7bd4fedebfe831ab2ba708d5ee

  • SHA1

    16dd0b24012b7e198ca96ba577d0745ad924e8e9

  • SHA256

    4abefca220a5eafc65e39a3b3e7ddfb0211177c7cd618c1a5996e1e4983db161

  • SHA512

    24a4451ea125140d9e7c1031e79c021ad1f0f16594751cd89b4b1671f7afc23d70d926575a96a24693f3b8bd98aba84194e0834edb5fc2c90121d509f18eff70

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1FN:T6a+rdOOtEvwDpjNtHPc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_01531e7bd4fedebfe831ab2ba708d5ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections