General

  • Target

    2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker

  • Size

    90KB

  • MD5

    da4656bfd308452e10b69aa0d0b7d592

  • SHA1

    abb201c2e68e899f6ec0749a98002cd1571999c6

  • SHA256

    78a039e43ec0eba0d383b88ff6c1a4b1381f9a51e28a02ba5e95085f0fa603f7

  • SHA512

    9c7b17f8ed6f5f4f422021d3d2b4169b4a90e9a949a31c5b71a0b7ca18b14979136119ad630384d5635b2030645c3c1562afff9c9f497f8a4c8901e89700ef3f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblF:zCsanOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections