General

  • Target

    2024-02-21_06b05276f01f73c74111c6d33fce59ae_cryptolocker

  • Size

    66KB

  • MD5

    06b05276f01f73c74111c6d33fce59ae

  • SHA1

    08c97e675c2d107e4e7398a9cb20c7b6a7bd3792

  • SHA256

    c55e51949af01fdbbe92aa8e6f9da030a58bcc78d43c9c50fc0ef9f3c85bcd82

  • SHA512

    f9fb2763ea014e05f8bba9461a829198b3675e858a2cb7bededad646dcaf8b21d39f7ba8c2d3fa17c0e7b3f1526e0f51d0e03fc1707933b9aacc77e36621a798

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvCbDa6L:z6a+CdOOtEvwDpjQHL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_06b05276f01f73c74111c6d33fce59ae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections