General

  • Target

    2024-04-30_56c9ec313377df63d282124142b1e098_cryptolocker

  • Size

    122KB

  • MD5

    56c9ec313377df63d282124142b1e098

  • SHA1

    9144bac235518f4cfa76a0a10ba16f98d3a1f612

  • SHA256

    766e7543163177df7e70c3b7e9abf1c2619844e0cfd93493997bdf03963918eb

  • SHA512

    6550b116b50f5a5e26c9e373a9f3262ec1326eb91b475148c3ffb604770ab3cd65c201d5b7faa393c0e5795374605bd98a132c6219e30cd748469da504adc84c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviPeB0:z6a+CdOOtEvwDpjczT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_56c9ec313377df63d282124142b1e098_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections