General

  • Target

    2024-03-10_6a5c7167ee549fcb31579db8aa090bf5_cryptolocker

  • Size

    63KB

  • MD5

    6a5c7167ee549fcb31579db8aa090bf5

  • SHA1

    0dd30dcf54e26fc84ff3d2baf3d092e59f5074b3

  • SHA256

    4ec8256d7606e86ebfb0544afe9497b77fadbb79cd0e90214086be41069e1d80

  • SHA512

    9872f51540e944e30e8a57633279a4a904baaf281fffd4feacbcbd43c73773e63f180c360290db5f9ee29382dd267644e896118d3e1175c1d9b76c64868b5e79

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY7DWjPy8l:1nK6a+qdOOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_6a5c7167ee549fcb31579db8aa090bf5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections