General

  • Target

    2024-05-13_6b4361abfed0708373fdc561abf0bd4b_cryptolocker

  • Size

    66KB

  • MD5

    6b4361abfed0708373fdc561abf0bd4b

  • SHA1

    2e4d0a264333dcbd910a1c70b99a929f2d6f4e6b

  • SHA256

    15991ef8d74f063b6df0f070905875b9a099b700debde6fd44a3cf25f0c51eb6

  • SHA512

    bc8ada12a1a3c2da315916a77accb328298d23007f4e7b059ae3d20e7e612f4a47b6fb77f1cc68515a9f2497f69fbd491db0797b163375511133982a4d4fd27d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRH:1nK6a+qdOOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_6b4361abfed0708373fdc561abf0bd4b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections