General

  • Target

    2024-05-23_6ae7100e0207ab0f648769fc42185c6c_cryptolocker

  • Size

    81KB

  • MD5

    6ae7100e0207ab0f648769fc42185c6c

  • SHA1

    5a0ccb8e26427f7ec00b09711e6caace4ac683b9

  • SHA256

    2fc4569883716482378a0fd613d0c9da283511238ec1bba40eb803b0405585f5

  • SHA512

    8cb5217b6b5a9676fc125421b9b89e65e8bb2513a09665fbe21acc415ce82491aa87734335f6f2a8724cc5d8563509a48d9c216c95239c69447290d0fb9c4177

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QpSxt:zCsanOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_6ae7100e0207ab0f648769fc42185c6c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections