General

  • Target

    2024-05-26_4156dad31d920cb19c900d12765a943f_cryptolocker

  • Size

    90KB

  • MD5

    4156dad31d920cb19c900d12765a943f

  • SHA1

    158292e815e655e494ceff2fdeda45aff4facbe0

  • SHA256

    5058b62f7d1c86e98a9599be5b26d1313638c224234f307b6fb30322f5cc896d

  • SHA512

    0a6a5bd0e352e51e046ec6ef42378146903bee1109a58bf4258f7b9d20869c25208eb84cc992de5492c971c619a07753ecdf4afdf2927aea62dfda7a05a8c2ee

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAyS:n6a+1SEOtEvwDpjYYvQd2Pn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-26_4156dad31d920cb19c900d12765a943f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections