General

  • Target

    2024-05-23_12e28514d2736caf02c378293c786a13_cryptolocker

  • Size

    78KB

  • MD5

    12e28514d2736caf02c378293c786a13

  • SHA1

    430b31b781b1addfa7893a038c233e739bfd6bbb

  • SHA256

    23c6bcd7fa96662421c0ace746f8d13aa7f64559e9f1ea9674dc5fb57466186f

  • SHA512

    d4071161fa9e165a628b2f9ef86b43d4436afd79a044eb13f2b812cb48b7f38ea99a8538a153a0eb39d2c2172892460b08d7011d544815703c64c7bab1b8055c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1k:T6a+rdOOtEvwDpjNtHPP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_12e28514d2736caf02c378293c786a13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections