General

  • Target

    2024-05-28_dd1f8b901a6bd40b71ee479774307503_cryptolocker

  • Size

    78KB

  • MD5

    dd1f8b901a6bd40b71ee479774307503

  • SHA1

    56199ea80623afff1219cb9545b1d8a78c1cbbee

  • SHA256

    42145eeb5355290838ab2311d272a786e804d87204e6787759fa90c0e2f39923

  • SHA512

    42680ca3326146856018ec7b34c2a4c426e92f3fd501a70c7784d27841bf2db57e3a5408ba6153d54b55d66ff91a9b72d3298347409a727df815ff5189c5d33d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxng:T6a+rdOOtEvwDpjNtHPf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-28_dd1f8b901a6bd40b71ee479774307503_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections