General

  • Target

    2024-06-01_be38ca829a7eed40d105908c04bd31be_cryptolocker

  • Size

    95KB

  • MD5

    be38ca829a7eed40d105908c04bd31be

  • SHA1

    d6945ee11dcaa2c04bb00db0bc52c67663d81c8c

  • SHA256

    498cb68989dcba7aec8c330fd2a8613c1fc12d2712020a2c3b17aee6ef23a6e6

  • SHA512

    d5770d3deee16f6ebd1f1a4ea215aa692671b49e994768147e9c74f0f285ad6f7ff0c5166f32b018997dda1004f8880cc7436bbdd8e960f08159501d5345a074

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kg:zCsanOtEvwDpjBb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_be38ca829a7eed40d105908c04bd31be_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections