General

  • Target

    2024-05-30_7a1c007767547bed6ae39f5e2a30fb4a_cryptolocker

  • Size

    79KB

  • MD5

    7a1c007767547bed6ae39f5e2a30fb4a

  • SHA1

    aaf9b21a5197d212e800259d2ac14ca388d537d0

  • SHA256

    fa11810b656834c16e592b65ae456c83a8583a1c6d098f4feef489291153af67

  • SHA512

    e69997ad20f8c011424c1d3ff978288c4936a0c6ed3eefbb0e1e0839daed8ade30751149bb5d73548e9b44b53764543a79716031cbc8dfe074af127b9f25b09d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRe:T6a+rdOOtEvwDpjNtv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_7a1c007767547bed6ae39f5e2a30fb4a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections