General

  • Target

    2024-06-05_3a41378b16fa35e9ba5685f42147d41e_cryptolocker

  • Size

    81KB

  • MD5

    3a41378b16fa35e9ba5685f42147d41e

  • SHA1

    929adc9e42556ab6b2e776509648c2c5e0630d1c

  • SHA256

    b5d787cbf9fb48f4485b11d8b4f2169e3b05b7649892d8f16c703666841b4640

  • SHA512

    10f9f04cac7a5ddaacf1d94882e9656003363f1ef3d0d5642dbd27c6d1b37cb2bd5db0f19b8454799ba425d4c75e0243a7ad1402eac30d40160c2b980133753f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QG:zCsanOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_3a41378b16fa35e9ba5685f42147d41e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections