General

  • Target

    2024-03-16_6d594d06d153a6154c0cf9294c6257e7_cryptolocker

  • Size

    94KB

  • MD5

    6d594d06d153a6154c0cf9294c6257e7

  • SHA1

    acc44cee8fa7724976c853ac6596c3b6fe46e59f

  • SHA256

    5c9a86e0a20a91e8856c3f26fa9926d6a7f66879106cf709f24ec9ac9a5714e0

  • SHA512

    a88afed930746f18870a45a35a937f0ba2e4a392e6e90e5922100e6c0b5f1d1c6e647dca10b3c3e1e42a737c1ae2693e32bf35242e40eede9d5ca63f11fc4b73

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/n:zCsanOtEvwDpjBn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_6d594d06d153a6154c0cf9294c6257e7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections