General

  • Target

    2024-03-09_6f30a615f18434393d722ae6259ec524_cryptolocker

  • Size

    118KB

  • MD5

    6f30a615f18434393d722ae6259ec524

  • SHA1

    f44b3e9f24ead906a83c1e1d47534849c45a85eb

  • SHA256

    6876d7d608de429db70f90394b336a6a24b01aabdeb94b4bc7262e12557990dd

  • SHA512

    49b59d5d0e79548dfd6d1d945bd1336c63b1ccd32883a0b15054aecedd4a3506e737ecce0f54ddad21edd6964bd0121f81b5f13a5a99ff959f7c0fe5a823e4e0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qat+:z6a+CdOOtEvwDpjczG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_6f30a615f18434393d722ae6259ec524_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections