General

  • Target

    2024-03-20_6d11d4b7af47bf7048eaeb4cb7a0f9bd_cryptolocker

  • Size

    83KB

  • MD5

    6d11d4b7af47bf7048eaeb4cb7a0f9bd

  • SHA1

    0d94070928a0b96f2620424cdc776901a5da9dbf

  • SHA256

    e1a97aca2f4c242741851431c286fdc6def2ee988d0534e854d3d6041184a4ea

  • SHA512

    f436e80b88b53c423ad259fe72af1db19b99d889729694140537d2b96cc409904d99852152299d0ab805826d80b34eb2a9014df3ff6a784f44388d879a2d47af

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Hk:T6a+rdOOtEvwDpjN4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-20_6d11d4b7af47bf7048eaeb4cb7a0f9bd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections