General

  • Target

    2024-05-13_f6a1b2b58bfdccd5a66da505b4837253_cryptolocker

  • Size

    78KB

  • MD5

    f6a1b2b58bfdccd5a66da505b4837253

  • SHA1

    49d450d9ea5a357436ca22796a28530ad3e1430d

  • SHA256

    7462ba8646d5cb83f2ba5c2fbad6ee2a688fb1e4936b10d16db33c5a60c83ed5

  • SHA512

    611855fa8ef125d130d6b650f2579bf442170261afb38a26d07e485462853388b5dd80dff8772527c772d7f6b6305f7322dd424cba996576ccf5d48094b75da0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1q:T6a+rdOOtEvwDpjNtHP1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_f6a1b2b58bfdccd5a66da505b4837253_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections