General

  • Target

    2024-06-04_b13383a91396202ec2a5fa0714f08b0d_cryptolocker

  • Size

    81KB

  • MD5

    b13383a91396202ec2a5fa0714f08b0d

  • SHA1

    ded6df874be299b0523765a553e2ae7ba55bd4c2

  • SHA256

    43ad577e175db3ade054a166341bc1b8a72687f49e69fc060a32566a99f180b2

  • SHA512

    761c8e01b9bc77f4474e90c695e8b6a82b66a1a735e592689380c7ee8bad4bf4e08f80eb9c937931c070ccbfdb0b4242b10fb8add826c9568534266467574908

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QD:zCsanOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_b13383a91396202ec2a5fa0714f08b0d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections