General

  • Target

    2024-06-16_39bdf8a9e4a499b328c9df6058580b73_cryptolocker

  • Size

    91KB

  • MD5

    39bdf8a9e4a499b328c9df6058580b73

  • SHA1

    649320a233b782c62f7a9f8bf526f4ce771684c1

  • SHA256

    a2e8e046f093cd67b7b1ef58c29766b73e3e2da957873f085ad8df8edf61691e

  • SHA512

    ec6b4162434ebb1bbea3774d44ec26dba8e711c98a13d599cb03835b9543efe9629269273828de8ee3d3eeebfbe3db2c9b6503a42660c099a369b7fa6e132dd1

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAe1:n6a+1SEOtEvwDpjYYvQd2PI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-16_39bdf8a9e4a499b328c9df6058580b73_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections