General

  • Target

    2024-05-11_c10c9f37a85ce00f2acedfa3a6122c0b_cryptolocker

  • Size

    66KB

  • MD5

    c10c9f37a85ce00f2acedfa3a6122c0b

  • SHA1

    96a16040c3aa6f04bc3e428ddc9839130c98b34c

  • SHA256

    6b00ad54e6f18d823a59f29fd904abe2aefa25cfedc24a667c86ac4f88b11145

  • SHA512

    8c4b7e7a5f9a2b3704a2f153f7574def623d04c18ab353007d9adc15e31e69696258aa30f579cfaee71158631217f23f8363fd4fc5b9ecdfec78ba8dd1c4c2b6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRf:1nK6a+qdOOtEvwDpje

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_c10c9f37a85ce00f2acedfa3a6122c0b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections