General

  • Target

    2024-05-23_4335113e571b367c03494d9d831e8ac3_cryptolocker

  • Size

    59KB

  • MD5

    4335113e571b367c03494d9d831e8ac3

  • SHA1

    077ccd0204d70cd27fd636f2157d0f777b832eb1

  • SHA256

    9836437784d7dbc0b9b58d76dad9d303db74950c71964f874e4c7a13ec9febeb

  • SHA512

    dc41b6fe9989324869aab645e85567902a72f1af890018a85af93915bd7bcb52e00419bec5f7ec6a9c35dadd71bcd5cf03576aed47b5a371539e3a2aebc5d213

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axK38nW:z6QFElP6n+gKmddpMOtEvwDpj9aYaQ8W

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_4335113e571b367c03494d9d831e8ac3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections