General

  • Target

    2024-06-05_7bdfbb7d0540e58ce51067c6c14070b3_cryptolocker

  • Size

    82KB

  • MD5

    7bdfbb7d0540e58ce51067c6c14070b3

  • SHA1

    53bba08dad234f0edfced3832591918944befe1c

  • SHA256

    f3e94ac79b35e6589bc213b52578eb41d404d359c82e66f8a2e998c9276314bb

  • SHA512

    15d55cb2b6495f182e0bd751d587a579ea9f0f9bba2e3de0f5bd4dcb5b8183c1da5123cb22b7976e6011c4e702615e89e56c0cddbf94fea0894d20d5d7aba6f9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QQ:zCsanOtEvwDpjE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_7bdfbb7d0540e58ce51067c6c14070b3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections