General

  • Target

    2024-06-03_a0d53b62e1f72c416c2392e49b8c57bc_cryptolocker

  • Size

    89KB

  • MD5

    a0d53b62e1f72c416c2392e49b8c57bc

  • SHA1

    83a87b5e7d65dd8ca942b6ea93fe9df692ed159d

  • SHA256

    7de30deefe6d3ee8aabd10088f51ae3a5aee5d0ab558ccf15d326cc481e103f3

  • SHA512

    101b180711263cbca655e1efec138624d236aba366ae4cbb9863797c043edd17f98a83794256be389f5bb0bc5c74352cc722e82f31aeadc584e83a1da5f3c83a

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAV/:n6a+1SEOtEvwDpjYYvQd2PF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_a0d53b62e1f72c416c2392e49b8c57bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections