General

  • Target

    2024-05-23_2994d6b5109f9b5cbdf7503b2eb67b33_cryptolocker

  • Size

    78KB

  • MD5

    2994d6b5109f9b5cbdf7503b2eb67b33

  • SHA1

    fea45a0f4c669baa4e666fe4a7781e335e81e8f3

  • SHA256

    ea81c483801480e889f6073a7ecf4b5e68f122cfd364671c37aaad3ef4c2b17d

  • SHA512

    6d1bb949f9e447c74a87523eb4af8ca297a118e1f8854e9f01dd039642d5b29e95dcb2fd9a474cb2faba34831d2a4e6969498c091d9b004b0b9dd6c56cac763b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1O:T6a+rdOOtEvwDpjNtHPx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_2994d6b5109f9b5cbdf7503b2eb67b33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections