General

  • Target

    2024-06-14_830087835fc721e44da80612c3c371be_cryptolocker

  • Size

    113KB

  • MD5

    830087835fc721e44da80612c3c371be

  • SHA1

    d2ad70859fe48f466022c2d83efd0bcd1da6a6f0

  • SHA256

    0ac490d3d4458ab8b20c7cc6393dcb232bcfa95d7f20408e265fd6c8888676c1

  • SHA512

    b53f2c0e4816c14c2dc4a7f32594b01b51c2dad7d693ab6314b0b4e924c18865832d1c50e9082f1336498d9822240d2f758990b1e68616e090d1c30b215ef479

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwMgddBe:T6a+rdOOtEvwDpjLzw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_830087835fc721e44da80612c3c371be_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections