General

  • Target

    2024-03-12_6b8c176225d5923261d6366fa090fd49_cryptolocker

  • Size

    79KB

  • MD5

    6b8c176225d5923261d6366fa090fd49

  • SHA1

    dc0a8f535d6067e473819121761ca8b94102002a

  • SHA256

    882923d9b3a32abc24bce5ba413d093a4977817e0400d23ad9d7e6161be07936

  • SHA512

    1c8783a6e9a6da9025dbd92d873d5f5c64bcba3ab5cd4c092d9a3d9d997eec5145d0e737bde6707d035dc8e16488617372f8c6c3259ec4e8ad04b586d635ed78

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdT:T6a+rdOOtEvwDpjNtl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_6b8c176225d5923261d6366fa090fd49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections