General

  • Target

    2024-04-05_67ece162876f9830274642196821ed55_cryptolocker

  • Size

    62KB

  • MD5

    67ece162876f9830274642196821ed55

  • SHA1

    1637e3e8cf8b5550461afe0014a547afbc9a28c9

  • SHA256

    f65b8b5499ff340436f115f0b595112a50007bf026db4ecadf499c002645bf83

  • SHA512

    ba1bdb0a8407b4d3bcdd485d6b2f4caab619c3c939d017b4edd28a83be9c9a679a7c2e53b3978ceee914803113c0c543de633f4726b7070dbf464a45eba39033

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKS:P8mnK6QFElP6n+gymddpMOtEvwDpjYg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_67ece162876f9830274642196821ed55_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections