General

  • Target

    2024-06-14_aac4fc736e825808c4d2e00f3547d57a_cryptolocker

  • Size

    95KB

  • MD5

    aac4fc736e825808c4d2e00f3547d57a

  • SHA1

    164e4f0a3d60c422837e6c28110d82448a2f244e

  • SHA256

    ffe22b61fb4405a7844175fad940cfc70e8ad4975ec08e47fca4eea2f231090c

  • SHA512

    385e743e4f02f8f557b56eaf4cb41900d106f554a937e15413436c708c172df332f99386a33db03d6798a800135099deb55f0f6fc76ae71d6e5d9527e47530a1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/k7:zCsanOtEvwDpjBI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_aac4fc736e825808c4d2e00f3547d57a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections