General

  • Target

    2024-04-26_ed6def1f9bf5c3dcd3eee1231fdc8ac5_cryptolocker

  • Size

    68KB

  • MD5

    ed6def1f9bf5c3dcd3eee1231fdc8ac5

  • SHA1

    9b7849f1012858dddcbf8be82371566895ae8df2

  • SHA256

    cf35dc635c9044c74b67a4fc499b321be07b511ccff0461b739424b215cb970d

  • SHA512

    ad7d2b9f49a95b8666d11106850ec7eba26136626e16c5a57aac9dd0cb4314f9f5aaa84ed80ddad8443b23db1ac48cb8db96ad5e134ab240f3844d8b366c382b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncHUBE:1nK6a+qdOOtEvwDpj+E

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-26_ed6def1f9bf5c3dcd3eee1231fdc8ac5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections