General

  • Target

    2024-02-01_688ec4cee9cec4e215fbd40f7108ad74_cryptolocker

  • Size

    66KB

  • MD5

    688ec4cee9cec4e215fbd40f7108ad74

  • SHA1

    55463aad6742005b535bda2b138128d7926130ea

  • SHA256

    0c6da43d5501d2df1ef94bc01b639fb722ac5c33a8b3790cb82aa1614467705a

  • SHA512

    056c61d6de04b0c8afcec627b0e8e62716d2b667441c09ad1fbbf179f7116c7c6d99ed3113f3e360ddc27d1824974267c222d66daa5a4affb288535b1adb8ae3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBPF:z6a+CdOOtEvwDpjQP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_688ec4cee9cec4e215fbd40f7108ad74_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections