General

  • Target

    2024-02-03_6640c21028193b7c8a70721e1e20160c_cryptolocker

  • Size

    81KB

  • MD5

    6640c21028193b7c8a70721e1e20160c

  • SHA1

    d6fe90aaa14016edd1e29ef3574eb2f3ee77897d

  • SHA256

    7a4be16f3848ba1150ee441033fc7dd7f93d7c408cdcb83728bdfb4495ac994c

  • SHA512

    2893901d107063b66ba1d65e0cfbaac7bf5afa2fb5a52bc3b45d7475058e11680d0d1b53358133ff2ae6a0d45f0d036c5cc3c951765c5fb1fc20c8875163ead0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7v4:T6a+rdOOtEvwDpjNM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_6640c21028193b7c8a70721e1e20160c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections