General

  • Target

    2024-02-03_6942bfa74ed5b902f1ff5a21ab25b7dd_cryptolocker

  • Size

    62KB

  • MD5

    6942bfa74ed5b902f1ff5a21ab25b7dd

  • SHA1

    306c26abf507b7875c67be3f4e19b8afd8f2a1e9

  • SHA256

    02dcbd788117727ba95336287ca79b7afcbf9be91cdf523cc7531c6c17c25cc0

  • SHA512

    c68320abf1c78e383df2f4b0fcebd8947a0de1d6d966ecc895079b2f134638fea35fe57c26d3587aea5fc84c67d47a4379e5223f4b0265d027e17520b91bef0b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo3:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_6942bfa74ed5b902f1ff5a21ab25b7dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections