General

  • Target

    2024-04-19_b6bd6db2ad4429f0ddcd67014b78c29f_cryptolocker

  • Size

    65KB

  • MD5

    b6bd6db2ad4429f0ddcd67014b78c29f

  • SHA1

    09464b85b71ec9678b84085e559221b47e066023

  • SHA256

    2c3d41f9c35b0a799b45fdddb56b1ee8126e3bf1b8630646aaa259789f2eefa4

  • SHA512

    893498b0ca1aa33f3b05be138aab7e8e2b621a80df15c9c70fd5a536fc1e96cd59013615d6f35e0e4a245a185629cea35d3caeec4fc00b11b10f5ad4c5e95cc7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyP:1nK6a+qdOOtEvwDpj0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_b6bd6db2ad4429f0ddcd67014b78c29f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections