General

  • Target

    2024-04-15_6a216f0b8a19a90e6597dee6a3c25d49_cryptolocker

  • Size

    84KB

  • MD5

    6a216f0b8a19a90e6597dee6a3c25d49

  • SHA1

    b56e8ca048ee9191241f3c4caf3dd6f25c67a3e0

  • SHA256

    7e56f5a344e3c0c38bc98cfb68f5de19f569308ce9a5ee37c2d16fbdece00906

  • SHA512

    8c9ba35484781af41a6bce5977ba0797aca6e3d27c0b1480bb214a8841a50f48cb55e963843aae4badbddd88dcde032cc19a0d370380ead9cccfc5478f6ca6d3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5X:T6a+rdOOtEvwDpjNc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_6a216f0b8a19a90e6597dee6a3c25d49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections