General

  • Target

    2024-05-30_7a1c1f49a18d6c7c6a0e034250eb9013_cryptolocker

  • Size

    92KB

  • MD5

    7a1c1f49a18d6c7c6a0e034250eb9013

  • SHA1

    28453af96fb8d3be9d5aacc124262003ec3f94a4

  • SHA256

    021c9eafce3dee344c3ea76830afd841ce7e47db3411f2b21403f8f2255f2892

  • SHA512

    7365d608cb6c1090bf4d7bd85d20ded13ce7b23e0ac9afeb5a8a9e038262c00738c09b3a8785c5959852ff68a443262a20c65664b21754da6783628bdf666148

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Dc:n6a+1SEOtEvwDpjYYvQd2Pf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_7a1c1f49a18d6c7c6a0e034250eb9013_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections