General

  • Target

    2024-04-23_1b0993820ea93f0a00d66ec80dcc007f_cryptolocker

  • Size

    114KB

  • MD5

    1b0993820ea93f0a00d66ec80dcc007f

  • SHA1

    6794e2c60953b1371ee631b37aecb234619db072

  • SHA256

    6030eaa34984f7a5f0f9c9433f5ea84f2b1ae35e31627d258ed721689d164e37

  • SHA512

    d25525ef783c27b1420f87b1549e53edcd6cbc1a8dbd671c8f91988815994bc6954cf1d8f3e87dadc49c00cfa76dee7ccfaa088cd29eeae0195e7a70ebc4b4ee

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp0+H:z6a+CdOOtEvwDpjczE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_1b0993820ea93f0a00d66ec80dcc007f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections