General

  • Target

    2024-05-11_b6a1338a9f4dc2591615f55f35257455_cryptolocker

  • Size

    89KB

  • MD5

    b6a1338a9f4dc2591615f55f35257455

  • SHA1

    1f76ea9504d4fe2b0073f19a7d4d655aef3ab984

  • SHA256

    beac54b6a917953bf897b09464a7d5858d641b72987a0cfb51e06b84cd18561d

  • SHA512

    d89141b14b7be099ac691178191b23872658c31ec5520347ad8e3573689749e8faa9191caa14559c9093c27f3e6a9bc3cc7643c23859a2cdbd9128cadb624d76

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblC:zCsanOtEvwDpjh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_b6a1338a9f4dc2591615f55f35257455_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections