General

  • Target

    2024-05-29_0dd289b3dcdc72c573f9e5dbefa661cf_cryptolocker

  • Size

    95KB

  • MD5

    0dd289b3dcdc72c573f9e5dbefa661cf

  • SHA1

    f3cf90d2a7328a583b1d370c361256572dc72a8b

  • SHA256

    f426d16a0992b0569b4f9f80043aabd320dd8cf593c11645df32d85154a5d083

  • SHA512

    09fa0555c9641b1e8cd1d2cf161e35fd962dcc878e95cc4020182ae2d5ca06e56bb20d5c4f7da0d14432cd75c320fcc40710539f71e90cc591b43658203865ba

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kP:zCsanOtEvwDpjBs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_0dd289b3dcdc72c573f9e5dbefa661cf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections