General

  • Target

    2024-04-11_6d2bec56f62e400c1e00ccf43fa7a88c_cryptolocker

  • Size

    84KB

  • MD5

    6d2bec56f62e400c1e00ccf43fa7a88c

  • SHA1

    13b56b29727b0d65bd27276d4f7b97e1db1eab0c

  • SHA256

    2301d4df4d128e267853f88d9e526b3b2a8279eec1b64883f8894caf82c09325

  • SHA512

    c6b5c2edeb8cb52c668a7056fe2ed0ef55a24ca6466e38e1a8583dd44647eaf6c9f2de2766c3723ee1ac54ae34352d81693a263e88387c3c59a7322402868bc2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5j:T6a+rdOOtEvwDpjNw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_6d2bec56f62e400c1e00ccf43fa7a88c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections