General

  • Target

    2024-05-27_d6cc6364f26436bba6feb983c8a40b7b_cryptolocker

  • Size

    78KB

  • MD5

    d6cc6364f26436bba6feb983c8a40b7b

  • SHA1

    54bf0cc2622fe57ff403bba6e725e753decd2f11

  • SHA256

    f090f6d88f1334390e0a8598418af1c9202854ba647df671a4d08d4b53aa5bbd

  • SHA512

    33d9162edacc861c8d21e9aefa6bf263936166c2cfd06c0db6babcba3092edeaf1bab64b3e93956f667e8212b11193ac3d5f07b9399786e4e8b3954efd7b64e7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxS:T6a+rdOOtEvwDpjNtHPR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-27_d6cc6364f26436bba6feb983c8a40b7b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections