General

  • Target

    2024-06-03_405b363493e1c1613853f058570ca6d3_cryptolocker

  • Size

    91KB

  • MD5

    405b363493e1c1613853f058570ca6d3

  • SHA1

    c94e92970a19ebe96b81531b53096880524b4b91

  • SHA256

    3a99faebf72065b949af8e65e65b1147cc9d0c6166fe3f78af574055b4afe53b

  • SHA512

    855f71d2cb21b25690a9391f3f3b3a365c6fbe76d3a4cc553887c196d8802f75891ed49d11a2ec53f67875184be43eee24b4b99a944b7bc095a3077081296efd

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Db:n6a+1SEOtEvwDpjYYvQd2Pg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_405b363493e1c1613853f058570ca6d3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections