General

  • Target

    2024-06-05_838a3691baddb3f2ac08ea945ad19cdd_cryptolocker

  • Size

    98KB

  • MD5

    838a3691baddb3f2ac08ea945ad19cdd

  • SHA1

    23d30048757d3b67ec682ba52749ab1d8bd3cab0

  • SHA256

    f4685b73b1e4037a57fa09b7c475c39c78269793a1df9f9490239729c64334f3

  • SHA512

    4701bb26c4f4245b48b729f381b4a4f9c5d280043e1e97c4ba0a1b1c01bb534116bfe363dae305479a71361bbe2e2a43e3dbff056bb92a1b5253a0ea2ae22c17

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqIL:zCsanOtEvwDpjB7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_838a3691baddb3f2ac08ea945ad19cdd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections