General

  • Target

    2024-04-05_6673cc4fa2ae0112966bb8e7846182f5_cryptolocker

  • Size

    50KB

  • MD5

    6673cc4fa2ae0112966bb8e7846182f5

  • SHA1

    dba2cbcacd42ae703484b4cbe8ee9bb6f05ae3f0

  • SHA256

    993448f1e629dc1cb33ce9a522edb91d02418997748dd976d1de44721f17bfe9

  • SHA512

    fec165d3577fdbd2f64624324a172d6633696cc5643365b1d8706cfdd6a68bb319a3221ed6036083f66a91cac5eb7425bd146ee9e4d2e2866a5c5835648135da

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OT9aQ:z6QFElP6n+gKmddpMOtEvwDpj31MQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_6673cc4fa2ae0112966bb8e7846182f5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections