General

  • Target

    2024-06-12_c162f4fd2e71285876352e73d648cbae_cryptolocker

  • Size

    86KB

  • MD5

    c162f4fd2e71285876352e73d648cbae

  • SHA1

    4bdd019b0807cf2583a349e916c8a302c42d0e71

  • SHA256

    a0ba24fd02b1c56f8656a8e8fee89cfee549d1909a933858a55356ff61ff3681

  • SHA512

    4d1804573f5d9b83b2062b4638eb60fc1c01b3d4b82af71e319d3dc98428e02415e278bb19a456af254b4b85244cec35e6c7fc8cb66fd62244bc5fd1bfb472ca

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1cB+:zCsanOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_c162f4fd2e71285876352e73d648cbae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections