General

  • Target

    2024-05-03_067ee818091cde6a06372d184e18f63f_cryptolocker

  • Size

    77KB

  • MD5

    067ee818091cde6a06372d184e18f63f

  • SHA1

    af7dba86f2c2cb2e15fd56122446395ca2254952

  • SHA256

    8ed00713d0ccd9f3dc541f3a465f016655343a30b570d3118dec97d6e78ecbc5

  • SHA512

    7e4873ceed771d72f467343e65950d313efd94e1aa35b9e95e9f2afdab6ceb48ceecf46d92b0d0a1a1ebc3ea06be5905ae1aa0b9b545e47f14806814da1a7d8f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxJ:T6a+rdOOtEvwDpjNtHPC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-03_067ee818091cde6a06372d184e18f63f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections