General

  • Target

    2024-06-01_736ebbf0e2e13d385964399301dedafa_cryptolocker

  • Size

    54KB

  • MD5

    736ebbf0e2e13d385964399301dedafa

  • SHA1

    c45daa26d8d675783aafbed52dd6daa713a960b9

  • SHA256

    05cac8b51ebb289f42228034eed29ba0fa03e4e1dd26f59cc8fd2bda7cd61f68

  • SHA512

    97a9ee4971d45019206e58c61f661abbf66b3c8617f4fbf30f79e080a0683ec9b1d29dc44223db0f264df5229798499c694d7acb44e4f99512fe382c6fc696dc

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgd:z6QFElP6n+gKmddpMOtEvwDpj31ikgd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_736ebbf0e2e13d385964399301dedafa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections