General

  • Target

    2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker

  • Size

    63KB

  • MD5

    569452321ec4cbc80cb48ab4b0322c00

  • SHA1

    7e6159545e7879d33b92dffef8e1f1b20899d9e4

  • SHA256

    d9dce06790f4914759d1d3a3350ca9589a8c88809b1c4557f9d8b41c764bc542

  • SHA512

    a3116d7e668088188f50ca794ce16927a12986c961eb93ce94d5843915e01fa0500ca62d44e079943f5f91bc8c26c531ec902ef1aa893e3e842ae87dc72cafee

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jK5:P8mnK6QFElP6n+gymddpMOtEvwDpjY/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections