General

  • Target

    2024-04-24_6ef7f978682f3d3aa346d78ecfebcf42_cryptolocker

  • Size

    60KB

  • MD5

    6ef7f978682f3d3aa346d78ecfebcf42

  • SHA1

    b4b335e6f3cfed1ae639041fd3710caf5692dc01

  • SHA256

    1eddfe006cc76dc4d4d652c9bbaab3a0eec5784bdef2f396532e41310680fcd9

  • SHA512

    b0c0b1385a7ed215e9281c0cc33ea84bc08b2b553cfae01a25e2b254f322f535b93ba2c02fed39fc7bffa4fe6adb8034a7eae027a672537609420b75a72c8b6b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMh7O:1nK6a+qdOOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_6ef7f978682f3d3aa346d78ecfebcf42_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections