General

  • Target

    2024-03-15_53f8daabed826cc293583fff7e567dc2_cryptolocker

  • Size

    68KB

  • MD5

    53f8daabed826cc293583fff7e567dc2

  • SHA1

    06bdb94c9fc7a968df1f9d90f04ba32b494c1879

  • SHA256

    6c2966c7ba313cbc4cf9fc4ba622a61dc4669dbbff0ea6db3bebfa13dfe2db62

  • SHA512

    3a94c55e2a484f547f6c70375ef06c2fdd37453880d2e7e9154f0cb95f4859692cb3b0c5a3c728d4b909298aba0cb1ad02aea3016f539c9a61613f04204ef4b7

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBY:z6a+CdOOtEvwDpjQ2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_53f8daabed826cc293583fff7e567dc2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections