General

  • Target

    2024-03-14_06f1cca7c422bc8b9203d4700ac5dbcc_cryptolocker

  • Size

    78KB

  • MD5

    06f1cca7c422bc8b9203d4700ac5dbcc

  • SHA1

    5008869f58806718d29fb43b1feda5257e2c3fef

  • SHA256

    04f2292de99327aafceefd34572a98ff5253a232451f11c3919aad013aeb2c63

  • SHA512

    0190f0834316123130d4d0ef6fdc45d58a34792302cc5d6e572fe84cc4f9ca198608850f746e3fc31b5abafd267c9bb0585a7123d15a544518b6525c9ea3796e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuG:T6a+rdOOtEvwDpjNcA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_06f1cca7c422bc8b9203d4700ac5dbcc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections