General

  • Target

    2024-06-12_0dfb328e20ad1f4501711dfbbac9e342_cryptolocker

  • Size

    79KB

  • MD5

    0dfb328e20ad1f4501711dfbbac9e342

  • SHA1

    124c15d4a3ff553108448e6db4d0471f62899b83

  • SHA256

    1e7485178b4c1db56159b417f3d6f898ec157d36eb303aa072d6ee11c13c6dd8

  • SHA512

    fe1996db98cd7616cc52958d79dc90b3d3874eed01541e0c508206407f0be05674c51ee70007feb063c8a06a738e9cf9eaf0fa1daa767310b38e0c861e3c4393

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxg:T6a+rdOOtEvwDpjNtHP3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_0dfb328e20ad1f4501711dfbbac9e342_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections