General

  • Target

    2024-06-09_50ca7117911bd2d2c1e496e733593261_cryptolocker

  • Size

    53KB

  • MD5

    50ca7117911bd2d2c1e496e733593261

  • SHA1

    280e7ca907a16d4cd8d43ff3931c5ec7d34f1064

  • SHA256

    0748ef096ee5d33be2f347b75a26e8318b0d7eed76590824b2779bbbf0f6d233

  • SHA512

    ef353fa0afb67e75550c44f177d76839cc549dfc92730940f6d6bcb29259eae067e6e3ebee5e108cc8f8c54c6656e1306e266949e74396dced8d2538910818e0

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOF:z6QFElP6n+gKmddpMOtEvwDpj31iF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_50ca7117911bd2d2c1e496e733593261_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections