General

  • Target

    2024-02-03_60e8f4df23678c261185f03d04f09b04_cryptolocker

  • Size

    64KB

  • MD5

    60e8f4df23678c261185f03d04f09b04

  • SHA1

    96cbd1029e915c8abf60a31af54911c065faa3dd

  • SHA256

    3fe218965c2e0effa447c18062e10b717473459bfea87b52686f715e90f9f7ba

  • SHA512

    720cf10d1ca9637cfcd5431ee750b6fb3d5556e295c7a10ec8c6297580ec821e7b3c2fd8caab34ffac05042ae00cf6cbddd4a6f967b173e3856e8a6f441ade9a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3r:1nK6a+qdOOtEvwDpjT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_60e8f4df23678c261185f03d04f09b04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections