General

  • Target

    2024-06-04_45f3f4c769c0d94c2bbc961e5df61548_cryptolocker

  • Size

    81KB

  • MD5

    45f3f4c769c0d94c2bbc961e5df61548

  • SHA1

    e69b6884bf056e6237788ef209990322d43573d1

  • SHA256

    e9e71d3d2fae48b6c5ae9ad0a118c8204b293512b72068f5bd2de2628d863302

  • SHA512

    57b7501f6f48581da18dc9cea12d573b5439b4d96022f3215e1226c3b8d6d89506fa74ad32fa318a9871ca6208ac95409ac2b4f5955edfb1f089dac911b9dc58

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QY:zCsanOtEvwDpjs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_45f3f4c769c0d94c2bbc961e5df61548_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections