General

  • Target

    2024-06-04_84445e15e72ce4134d1fe764cac8ab7e_cryptolocker

  • Size

    78KB

  • MD5

    84445e15e72ce4134d1fe764cac8ab7e

  • SHA1

    70129d70fe328729993945f91dc266973384e5e3

  • SHA256

    a043345b59cf43dacc96c974b566325980ea579e5847c351f2a5537a0dc0f04d

  • SHA512

    ef8650c8fd51f6a13ea6e2c4588be8185bdfa09f398708f5f7757b6489f48f0258155cf475562e240946437b3b7d84bb8cd9eebe5f54864754a724569024bf6f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxn+:T6a+rdOOtEvwDpjNtHPV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_84445e15e72ce4134d1fe764cac8ab7e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections