General

  • Target

    2024-06-12_4bac603d386956537b1ee036bcda3ade_cryptolocker

  • Size

    84KB

  • MD5

    4bac603d386956537b1ee036bcda3ade

  • SHA1

    df9fbdfc3343e38ae571bd471e33fac8fc74d5a1

  • SHA256

    0a7f17ee871b5b0e7e372309d9c4df3a64215397daa2e5525d6d6c4885ab0d41

  • SHA512

    47e75231f1a6252f7cae219ea0ebaedafec147810d5855761e97285da1e786176c0de2aecc2bc50659b479cc6e9ef75623d4f6cb4f6af3a6eaf5e7e8038c89b1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1l:zCsanOtEvwDpjv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_4bac603d386956537b1ee036bcda3ade_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections