General

  • Target

    2024-02-28_6158e7ef110866da74e1fa0b14fb631c_cryptolocker

  • Size

    62KB

  • MD5

    6158e7ef110866da74e1fa0b14fb631c

  • SHA1

    fedec49a349a28452d270445278492ae1a1604f2

  • SHA256

    fb459b31ef15dae850d68e7fa80cc486dea974b54fdb37a0e90300c41fe228b8

  • SHA512

    22906736ddce4959c71d0e601eb4440901395e5440531738b53c0abbdf576c3b3359ce09923290c438a1f9934d8e7ddd2235fb1920f540e9ac57f7ff9c1399d7

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5S9UEz:T6QFElP6n+gxmddpMOtEvwDpjwa38B

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_6158e7ef110866da74e1fa0b14fb631c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections