General

  • Target

    2024-05-04_7e6072a6a0533c79ef05568f5a0c0f79_cryptolocker

  • Size

    68KB

  • MD5

    7e6072a6a0533c79ef05568f5a0c0f79

  • SHA1

    4a164886196be23df5f920b6c0769c35c0f88814

  • SHA256

    a921c77d715eb67a584764ac4af719cefe99df88a8e6c98d3c0dcaa0b37f0f6a

  • SHA512

    a0c2d646848fb6d6e7df2c1dc032d03fa5776674c9a024917e91a3dad369e6408a324051d8f4bd46dc39b2f57c03712494702ccda421fedcc7f3bf10cc28e83c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRhb:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_7e6072a6a0533c79ef05568f5a0c0f79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections