General

  • Target

    2024-05-29_c11c407ac30f2b089fe5fddc8ea8beb7_cryptolocker

  • Size

    60KB

  • MD5

    c11c407ac30f2b089fe5fddc8ea8beb7

  • SHA1

    3a2ba2b5f494f0c5080c582aefc064ffdcd8f169

  • SHA256

    44f02259fc6644458354305ab08eff281d162e460bdc12411f589dd20b567adb

  • SHA512

    6fc53b715617a04f888cf87a8ef86cf6e15467207904e421fcc955adcc064f64e1d452b3e65385cd3467dbc6b07b2a4d7cfe80df2b9f7b54afdc7dc9f1284a10

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pINx:H6QFElP6n+gou9cvMOtEvwDpjCpVXiNx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_c11c407ac30f2b089fe5fddc8ea8beb7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections