General

  • Target

    2024-04-18_f6f1458c8bbdd00bd1e61943a4710189_cryptolocker

  • Size

    79KB

  • MD5

    f6f1458c8bbdd00bd1e61943a4710189

  • SHA1

    6eec2b04dd89e6495ff370605ba7bc45950b76fc

  • SHA256

    11bc9994c142eab97ef6223b72f66fc44f0ad9f996be58554959fdc0b47d4e5a

  • SHA512

    201f766a25245f978fa300942733d98f3adb1eca53b3e87373d6ab887c1fe7f9c2ce0254c09f7d4b6631e1ed76ab73e919e5e0d165cca1a7451408b7d4f44f79

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QD:zCsanOtEvwDpj3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_f6f1458c8bbdd00bd1e61943a4710189_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections