General

  • Target

    2024-02-21_e6c62e3428f71f5538595a3983d61633_cryptolocker

  • Size

    105KB

  • MD5

    e6c62e3428f71f5538595a3983d61633

  • SHA1

    60e0705127efaa42102a523c02914b6b9f6c5d50

  • SHA256

    51b78389b72f32bac3aacbb64df537a655cc66996b5388c4c8f0a1a416817f33

  • SHA512

    ad5d2e93c60e8c6026c979f5b2da3903dcf29467b0b4d0707da7354db4e92d9b8c5fb1ce2de1e4468311725051b22e7125da8a658ab7de8da31373a18b92d248

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksr:1nK6a+qdOOtEvwDpjr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_e6c62e3428f71f5538595a3983d61633_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections