General

  • Target

    2024-04-29_c6d67e6c63eb7ff857f7990f3300bc81_cryptolocker

  • Size

    65KB

  • MD5

    c6d67e6c63eb7ff857f7990f3300bc81

  • SHA1

    6f956a7745f656e10e99341dac789c5d16827672

  • SHA256

    790935b0222324e671e905cf3e6af484b75d2d266e36edf0c73d1f716c84b2d2

  • SHA512

    e44ec6ee38d614932a20df5f59c9a6869c5ae77d42e2b8bee6453e5d798ecb7419c8cb9fda1dc21e4308a9c45dc56a7b48e569884fe1914188020db3a9f61582

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5Bl:zj+soPSMOtEvwDpj4kpmeLmQ/l

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_c6d67e6c63eb7ff857f7990f3300bc81_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections