General

  • Target

    2024-02-12_6e60fbf0626b3b505ab484c241dfabfd_cryptolocker

  • Size

    98KB

  • MD5

    6e60fbf0626b3b505ab484c241dfabfd

  • SHA1

    e946a0e19f353506b44cacbb2da61b2e6eebdd01

  • SHA256

    b9d9d0e3ca26cac3d23bab7cb7636e2ed2cb0964dbb8efc44d2f8cc93721898e

  • SHA512

    9cbfac4774c08d50c0f7f25d7f41c95a94f9ab87dc39119d73276fcef01c2fc156c2afb7d903b454a54345c81c6efcac38676050944bddf20f9acd793c86a5b5

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQfb:zCsanOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_6e60fbf0626b3b505ab484c241dfabfd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections