General

  • Target

    2024-05-29_b1af44cb2c93134e2fdd73b96429cdda_cryptolocker

  • Size

    91KB

  • MD5

    b1af44cb2c93134e2fdd73b96429cdda

  • SHA1

    65bd947863ba167e21b6ab137493dde862792ef1

  • SHA256

    37282348da9d1048b7d31ca9f89ceef405cf3c0580ce63d05c743ea51a6bfe63

  • SHA512

    4540f762dfb1349db0427347fc2c3b5cd46373e2bd2e951a297694a3b207e2602fc7b9dea581f5b3889a38e8e1065e5e79aed979852dcba44ba43e7be63b7ead

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Dt:n6a+1SEOtEvwDpjYYvQd2Pa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_b1af44cb2c93134e2fdd73b96429cdda_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections