General

  • Target

    2024-06-10_d9ea43c3783cedd412340eb44352441a_cryptolocker

  • Size

    80KB

  • MD5

    d9ea43c3783cedd412340eb44352441a

  • SHA1

    cb61c7024f51fd816ee46b4a8aabe8c9e980712b

  • SHA256

    5feff91bb005325dbc76141b0c0bf98a0927e09d48c296739491c82554eb24b5

  • SHA512

    e440b19019dbf88f351b093519779bb9a88b7579cdaaeeb1760166635696219fc960fa18799ed6bcdd64aeb317f1e44f565108238c4c238b6d3c74c238fe6e87

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1lO:T6a+rdOOtEvwDpjNtHPj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_d9ea43c3783cedd412340eb44352441a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections