General

  • Target

    2024-05-24_1e6e51e09529761962856c6e3aac4fc7_cryptolocker

  • Size

    78KB

  • MD5

    1e6e51e09529761962856c6e3aac4fc7

  • SHA1

    0aa5a92f99ab4ba1402471c71f187d602f0a79b2

  • SHA256

    68426c6b58036667b7cefe30c61a19411aea16df0a74cb355e65f21366cf37d3

  • SHA512

    32285f05a71926a2cec7c709fce0df49e2e72a5b877248a311bbeea9832ac863ad574b6152f02cc0fec1f7dea36bb4f706427c1804aaabfd86e35527b2ba6a92

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1Fc:T6a+rdOOtEvwDpjNtHPl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_1e6e51e09529761962856c6e3aac4fc7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections