General

  • Target

    2024-05-31_6540684a3424ce6f807ccc7e57a265bc_cryptolocker

  • Size

    95KB

  • MD5

    6540684a3424ce6f807ccc7e57a265bc

  • SHA1

    a1bab68286adc425c4aa64ef3394e846d9dff816

  • SHA256

    360246b50ab9c231fb18b625b768fce768aa5e8303d773e9c033f17bda2bfedc

  • SHA512

    2ecfb9d523e5a9d3b936f47083e1dc028f21c11cb0a2314c2325be1d370fa112c529edaebb0f9ed17cbbf34c7fc2d29c2b94a03093d89b1a8522c24061c9e16b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kn:zCsanOtEvwDpjB8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_6540684a3424ce6f807ccc7e57a265bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections