General

  • Target

    2024-05-17_0a6c0b654d2bc379244841fa13480eb9_cryptolocker

  • Size

    80KB

  • MD5

    0a6c0b654d2bc379244841fa13480eb9

  • SHA1

    17ba2e03baa5e37312ec0a1696cf1646279694b2

  • SHA256

    9cd0278c8ef2b451396995cca1c503df27130ac07f6dd5283cefe839a218df6f

  • SHA512

    99f985779a148847b843dc4b6db0294d42bd3cf3a77c24203ee1b4df671175e2a360c8474fdaaed0aba7a44efde37e8670aa3e08ee3baad564cb01d1c913ecb1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqdw:T6a+rdOOtEvwDpjNcR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_0a6c0b654d2bc379244841fa13480eb9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections