General

  • Target

    2024-05-30_6fe9f838a4971f1aed8fa23d2834cbc0_cryptolocker

  • Size

    85KB

  • MD5

    6fe9f838a4971f1aed8fa23d2834cbc0

  • SHA1

    809fffbfdee54a1526598b844ca78eacf28e700d

  • SHA256

    7ced5683937f72870c2982db6b047d7d0bace3bb64503d44f7b2df2a8d29c247

  • SHA512

    7bc2db37a6f14db88fdfc69a2f2245a140325174335b9b0c58097b3c124041d8d246970828341b9d36d7462ac7f36f6f51133f95a978df2adcfcb03d53cc0a94

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1b:zCsanOtEvwDpjR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_6fe9f838a4971f1aed8fa23d2834cbc0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections