General

  • Target

    2024-06-04_298d9fd20358633e45132d3e0619db53_cryptolocker

  • Size

    93KB

  • MD5

    298d9fd20358633e45132d3e0619db53

  • SHA1

    f2fbc8cc87e7f6249fe43fb612c27d06b43cb1c7

  • SHA256

    1cebfdd202ca5870e552d94f83dfc42f9de5dbc681c993f42e761fe63e755f98

  • SHA512

    b5004cb649a2a1ba834b58f016a86be597b291d9ef0d4b8adff4390b992bd4d495bf662ab8149d3652dd9e9c3755b9e19bb85d5c065bf8409ca8f9eee69a8e91

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWpR1C:zCsanOtEvwDpj/s

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_298d9fd20358633e45132d3e0619db53_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections