General

  • Target

    2024-05-26_81099c1a7d5c7624b29f2272e5162935_cryptolocker

  • Size

    79KB

  • MD5

    81099c1a7d5c7624b29f2272e5162935

  • SHA1

    2d30f49b8d0e465b8993425684c837e75a77bebb

  • SHA256

    0948720ee379185ea0708332de750ee4da4db50f9a2a3bc19df3c23a487ccc01

  • SHA512

    7c6131e70b5dbe00a92ddd5bb0f448505aa9a4c5a92e359df9ff808d7c2a13206b7c43a7983bcdfaba4077170b8d5be45be84e4cefa804fec97c1f45d8f26dca

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1g:T6a+rdOOtEvwDpjNtHPb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-26_81099c1a7d5c7624b29f2272e5162935_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections