General

  • Target

    2024-01-18_6e787e38647f7c41e43a7502675cd351_cryptolocker

  • Size

    62KB

  • MD5

    6e787e38647f7c41e43a7502675cd351

  • SHA1

    5b06129e684bd9b32d6a17678065c7636f20085a

  • SHA256

    509e502e4ea330935d8855f9c7c6133f456d1237015c52508494eac29a194c45

  • SHA512

    7ad04c5a6c1a205526ab9851c6184eedcfa08cdeaaaef2eb4b271d430fe508d72e3f92d28dfbbf1977e9dd9ed04bdbb38d80e810136e94b48ed1d84bd0794ecf

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwfXn:zj+soPSMOtEvwDpj4kpmeLmnwn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_6e787e38647f7c41e43a7502675cd351_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections