General

  • Target

    2024-04-20_6e2d1c6aafc56bdb5b1c8bcec493a509_cryptolocker

  • Size

    96KB

  • MD5

    6e2d1c6aafc56bdb5b1c8bcec493a509

  • SHA1

    55228a89ac70b3c6398c94c5781bc4e6ce736789

  • SHA256

    23858618390e7c9cb904e681753c28341c93bac96587d090ca7aae7725e16fe8

  • SHA512

    947d4069e5d9475e2c5b0d48401946a5fbff00f56e71e834c3b56dcf89c19fa6ff2a6bf364f21bedbdba7760fbddb333def9cedba1ad3257ca550c56c1bac157

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/b5:zCsanOtEvwDpjBN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_6e2d1c6aafc56bdb5b1c8bcec493a509_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections