General

  • Target

    2024-02-17_6df1c1e5f1c6211858a5cef3f17d9258_cryptolocker

  • Size

    96KB

  • MD5

    6df1c1e5f1c6211858a5cef3f17d9258

  • SHA1

    edf86547cc4d07533c7102245aa7c746e338656d

  • SHA256

    f09deeb076b4c6c5e0e3d8af7e677c44ce3891c59ea608938c9d0556e06251c8

  • SHA512

    05dec8a99ca6a073ba319c7f4a9fb76a150f4ed2683cc28b057d2cfea182e935dfa5abaadcf99d8019be3856e6990b05c528cf4845ee15934045c5b8b6922937

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bz:z6a+CdOOtEvwDpjcR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_6df1c1e5f1c6211858a5cef3f17d9258_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections