General

  • Target

    2024-04-19_6a40a729f4e6422e50c775fcc75cd01e_cryptolocker

  • Size

    51KB

  • MD5

    6a40a729f4e6422e50c775fcc75cd01e

  • SHA1

    67d0175b44c5b05925cafc81750cc85bfb6e42e1

  • SHA256

    a8f8519a381380943658a4936541b0555a6bae5ca28c1ce7146750d1a15657fc

  • SHA512

    db4205af01f37aadf471d238029d1975dbb7f5a9416cac0ef2f4112befa69308edb1c2b90621a25ba8cf8a8a5d470e75658a18c3b02ad6df6bf81407011b534d

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOi:z6QFElP6n+gKmddpMOtEvwDpj31ii

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_6a40a729f4e6422e50c775fcc75cd01e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections