General

  • Target

    2024-04-18_7a6d8b32913b901dcd781ab6e81bdec0_cryptolocker

  • Size

    63KB

  • MD5

    7a6d8b32913b901dcd781ab6e81bdec0

  • SHA1

    59a63b2cdec8c8df129bf50e2f3e0aa02ae27b80

  • SHA256

    66a1818651ac9429ac499fc87f0e1e1f4144b9b99c587843631e63d9ade095d5

  • SHA512

    f0faf83f8ee37b31543db785de8aeb775a2435a102b51ad22d5f322909ef2a319544814f87a452b8fe3704a881f1b495906500e929086cda7829facd4f6bd112

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwfXt:zj+soPSMOtEvwDpj4kpmeLmnwt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_7a6d8b32913b901dcd781ab6e81bdec0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections