General

  • Target

    2024-02-28_6b13befb4b4c58202b30c22937b3b0f6_cryptolocker

  • Size

    117KB

  • MD5

    6b13befb4b4c58202b30c22937b3b0f6

  • SHA1

    393b4d62f7b585a9189bbc5df5a25d8e158c6abd

  • SHA256

    7efe98ece4332bdafbbf8230ad775f36ecf84c015e06ecfba278177d24c3b278

  • SHA512

    19bf5b24a7a2d55ebe43a63da4ce9573c6eb1061325f1785f9ac0d62a188a8b01b1939d756bef6b4fc68513062a8cefdb25f65f92e0374764e0d180b2bdbd4e5

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qa5:z6a+CdOOtEvwDpjczT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_6b13befb4b4c58202b30c22937b3b0f6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections