General

  • Target

    2024-06-03_902b8a1b89afcf32338f316a3b53110b_cryptolocker

  • Size

    79KB

  • MD5

    902b8a1b89afcf32338f316a3b53110b

  • SHA1

    b533518162b28439f0d8730e6b2c2e529e5ed8fe

  • SHA256

    57cba19d72a1083a589bacd7b296f2b73dea429011897d880c46b889098e5a76

  • SHA512

    68303170a4c73413f68dbe7f329a9514f4fde187a0dd6d65235fbf9b5e8294f8b34fb64409cb96ce0752e674b3182a405150163fbaf1cc4c35a65cef2f760a64

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnV:T6a+rdOOtEvwDpjNtHPW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_902b8a1b89afcf32338f316a3b53110b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections