General

  • Target

    2024-05-01_c61920140e6f10cd026358d9eefbe11e_cryptolocker

  • Size

    89KB

  • MD5

    c61920140e6f10cd026358d9eefbe11e

  • SHA1

    d424c51ffcd3eaec7d62f121d45bc2168336c6a9

  • SHA256

    e9898c7f8c94622073a616bb51d7668935095d6077f1477ad89cf4a4f9681323

  • SHA512

    8981fbbe6ae05b31e6154f3112074604cb7871b0cf57a68d830dff3d1adca7bc859926961dcffabba903b34db6ca4511fd1cc166a4b4716c25181dbb1ae41eb2

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAT:H6a+uSEOtEvwDpjrYvQd2PT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_c61920140e6f10cd026358d9eefbe11e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections