General

  • Target

    2024-04-21_6b3dffef8e04c8f596a78efc607246df_cryptolocker

  • Size

    110KB

  • MD5

    6b3dffef8e04c8f596a78efc607246df

  • SHA1

    86aa1f344814c0dfb56ccaf8c1ead7c5260ce683

  • SHA256

    9864dd206a177576e55b6c8e8c427cc9056442847b10da0cd878938d821346e5

  • SHA512

    16d4903c9fbf7992cf94a92d8d5a0051b6b0662b2dfee0dc13e397579d16667992401a59cbe23b485c6334255e70a2f24773227bc87a1b8de5618ea9b06b0ac9

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMghJOvjv:z6a+CdOOtEvwDpjczm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_6b3dffef8e04c8f596a78efc607246df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections