General

  • Target

    2024-05-30_3a231f98503fafa4754f8dedb470d268_cryptolocker

  • Size

    62KB

  • MD5

    3a231f98503fafa4754f8dedb470d268

  • SHA1

    13a3ba255bdbd9076d3f2bdb62035943166ca11f

  • SHA256

    593dce1308edea7090f86d470d04b89fd906a29a04723607efdd910ebd590c97

  • SHA512

    f658a47510e5183199bda516165b322e47e79c621c4d4e9c9920fc1f0ca56d49ff3f22405c000d401c296c97d70a60e816dcc6355d841d9a1cfcb1d31364747c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMhv0:1nK6a+qdOOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_3a231f98503fafa4754f8dedb470d268_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections