General

  • Target

    2024-06-12_ba5abc00e1b92f43f39df16672c08474_cryptolocker

  • Size

    81KB

  • MD5

    ba5abc00e1b92f43f39df16672c08474

  • SHA1

    da1c1dec4a64141ead34942ca82c029338213bc6

  • SHA256

    3791ed306d564f46ff9ae24f64fb42cdbec7a0527a6beba65d1c74f547fa6f0b

  • SHA512

    7b89b26bb33000ff8b70a9ec2abd2de7175ed7abc2c818b9df69508c3b211371c706427487c61b717dc3260f84cacade9c7a5be0a9c0136709f81dbaf25efc44

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdi:T6a+rdOOtEvwDpjNtA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_ba5abc00e1b92f43f39df16672c08474_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections