General

  • Target

    2024-06-04_39cb1d44f280600650dd471e275ad4ff_cryptolocker

  • Size

    85KB

  • MD5

    39cb1d44f280600650dd471e275ad4ff

  • SHA1

    17f3c064d7cff3b6228685d171a1511a2cc32364

  • SHA256

    a077d2f13751d98bece780a9761b66f60a751fac6031cbc8a57345b4c85f9814

  • SHA512

    e29d2f978e22dad8532905c17e93c7c757b8fa90b15b5bbe4acae7cafe4bc555771d6b9f220784d48c529a1984e16eb8a47f496b18bbb2afe94072a747711a14

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS12:zCsanOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_39cb1d44f280600650dd471e275ad4ff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections