General

  • Target

    2024-05-22_ec93cc76217abcb63d423cafd77e9058_cryptolocker

  • Size

    91KB

  • MD5

    ec93cc76217abcb63d423cafd77e9058

  • SHA1

    6d80df68c9352f428c8a9670519f60fa026ab1f0

  • SHA256

    761a42b17bd1db0e7a9cb194ea1b2be9cb433af828097c9b248769a0a4a7ef4a

  • SHA512

    1feb4e4df78e403c69d955bac66bbf03c8b72fdfe558c45b6c6d63b70ea466a2ff0dfe13b0c314e43417c90b798800fa5c0d94627f593c1c4c1cc88a81b8a7b9

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/DB:n6a+1SEOtEvwDpjYYvQd2Pe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_ec93cc76217abcb63d423cafd77e9058_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections