General

  • Target

    2024-06-10_4025e9ab35ae133335b3c99f5a14d796_cryptolocker

  • Size

    92KB

  • MD5

    4025e9ab35ae133335b3c99f5a14d796

  • SHA1

    9b0903beb769ae04d023aeffcaaa14aef9ddc65a

  • SHA256

    737affe979ce52bfa354fd63025cd8aa2146122d01c88270d3367b945d684cf1

  • SHA512

    5982da96526e3e1cf61d9a0d96e6e6be9be1f5946dd59c8ec38c08bd04de349303fc129f32016b6ec1905db446eb1aecd21bb6d20c3115e4addff4dce43b6351

  • SSDEEP

    1536:f6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAw:f6a+1SEOtEvwDpjYYvQd2Pw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_4025e9ab35ae133335b3c99f5a14d796_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections