General

  • Target

    2024-02-25_b6b13b2ee22102d07f98e536dc026b6c_cryptolocker

  • Size

    82KB

  • MD5

    b6b13b2ee22102d07f98e536dc026b6c

  • SHA1

    4d1368c0de61423720fd3dcf1c9dbff3f7bcd06d

  • SHA256

    56837c3483a0629566afa719097efe4c3dbad54cba42567f1edcd0ec10f62031

  • SHA512

    f4a531f6693d08fb2b3de127ce16e40eb5969c0f3487b149a95aeb4556547ce307c0aca40288a17bdb70e003f0412106872f919518e0b6dc3b11f19896bd3556

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7v0F:T6a+rdOOtEvwDpjN4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_b6b13b2ee22102d07f98e536dc026b6c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections