General

  • Target

    2024-06-04_8a5baaacaf930153c327be1158fa8987_cryptolocker

  • Size

    76KB

  • MD5

    8a5baaacaf930153c327be1158fa8987

  • SHA1

    e4e3f3d39c5a485ff8b17e3ec6f16f5c31dc192d

  • SHA256

    41c5e1e31f5d8aa42aa306a7b4dcf51b2e944024c398193b20b91ca5dae35328

  • SHA512

    0b327ca5409433bcc7f058b392ead0c0e1060ad6e86e87604a15a9ad061d6d3b1bdd3297b5b9339d5ad0a367e86ec1e7677db42c894359f1f8434b989440c7de

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gp:1nK6a+qdOOtEvwDpj0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_8a5baaacaf930153c327be1158fa8987_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections