General

  • Target

    2024-05-28_f4b71c644fea51a7ac16a7eb8ef930a3_cryptolocker

  • Size

    79KB

  • MD5

    f4b71c644fea51a7ac16a7eb8ef930a3

  • SHA1

    b6b5a43c4a236fd0d42693b320e261a7541cf63e

  • SHA256

    526419d2958eaf7e2990abb5d98591a244737e1d7660326ce843f6260d629dad

  • SHA512

    a62ca9dde76ed6a37228cfada20965236186ab831ae0914f4cf84866a527d3eacff4cad7eddd8415fa0920f20c9c98422f9255aad8798d406071df390ba6867d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcR3:T6a+rdOOtEvwDpjNtG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-28_f4b71c644fea51a7ac16a7eb8ef930a3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections