General

  • Target

    2024-06-09_738fdd7ae3665a5163a0fb3fba78b6ed_cryptolocker

  • Size

    95KB

  • MD5

    738fdd7ae3665a5163a0fb3fba78b6ed

  • SHA1

    dc148456f6dc067b2c238676270d21d52922339c

  • SHA256

    c6ef8d59aa4e069b6069849bd264bae0006870797dd4422062727dda81d72660

  • SHA512

    4bffdc0ba55721a2af3232f9e91ebfc8490f98867d2960bd6e96eb29085774ccfc782bb63626b86ff88254eca836b26a8e672825f039a77930e4385bd2aa9259

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kOQ:zCsanOtEvwDpjBK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_738fdd7ae3665a5163a0fb3fba78b6ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections