General

  • Target

    2024-02-12_63458bc6e5baee0d4b92ba5506b77ef9_cryptolocker

  • Size

    97KB

  • MD5

    63458bc6e5baee0d4b92ba5506b77ef9

  • SHA1

    c6cc84258968ba44a9a8ad633b5aa8449258bc92

  • SHA256

    6f83f7a68f3da179cdc12f854782c51b0cdc328d39e11d93c8e9c677d0f14e99

  • SHA512

    c4884df32a902ae47beb60462bb4cb3823140fefe92406847701a6cb94fcba9f0493a77a2272b896e16dfc32f60778cfc82fe8457e380f476abd03c99202b9f0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKE7:z6a+CdOOtEvwDpjcv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_63458bc6e5baee0d4b92ba5506b77ef9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections