General

  • Target

    2024-06-12_3eb444b4c1407a139837852c82bbe91e_cryptolocker

  • Size

    60KB

  • MD5

    3eb444b4c1407a139837852c82bbe91e

  • SHA1

    5a3fe617926de71c9b290e315b74ca8502dd4dba

  • SHA256

    29d21553fef887db41446ab229156a9a172c1eadd6107a84e6c50c246420f6ea

  • SHA512

    982629ba4552790a868a9e57032eb9d874088860387c2d2348b8e9416cf1abc12d39dd113df220d8c19b0a7df3a9c6b9a70e4b687c474616d674059105daf28a

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pBR:H6QFElP6n+gou9cvMOtEvwDpjCpVX5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_3eb444b4c1407a139837852c82bbe91e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections