General

  • Target

    2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker

  • Size

    89KB

  • MD5

    f1acbe66ca726fa24aa67c884f1b189d

  • SHA1

    22efb1e65a59d24fd81598d6124cb55f6d594071

  • SHA256

    6cf2c5a519ea2466a81d9be0059172a103134e75385ed13dd64077985751f75f

  • SHA512

    da2a847472adb4ea7e8229bedf555c9e1ef471f4757f3fd603b690085d8af5b247269b065a7aef690efc80545f916e92834b408dc5dba6b360b6f2c43b60e8b5

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Nt:n6a+1SEOtEvwDpjYYvQd2Po

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections