General

  • Target

    2024-04-08_1593b6cf4803b9b5958d2b028e9f92be_cryptolocker

  • Size

    100KB

  • MD5

    1593b6cf4803b9b5958d2b028e9f92be

  • SHA1

    beb436deb4947a2a876f24d9ab075f36617ee1e8

  • SHA256

    6682677ff73494e1a70270a77873660dba6412f6c0de41125d8c48f7d145fbc9

  • SHA512

    dda74c7ad21d175256e023751f7ae62985276ad3aeee243f69d0272ba008dcd3a91229424cde17952f773867f09ddb36557340ef5003df2c5a5ed9cf22e2a0a0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXa6cLCD:z6a+CdOOtEvwDpjcP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_1593b6cf4803b9b5958d2b028e9f92be_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections