General

  • Target

    2024-06-01_b2dd4f85c58f5c2765770545fc0c33ef_cryptolocker

  • Size

    75KB

  • MD5

    b2dd4f85c58f5c2765770545fc0c33ef

  • SHA1

    5ffe6908e241ed07ef9e036f13d44c5cb19c3ee7

  • SHA256

    7d2db482e698225e84f55a140e4e5d60ea5f066ff38c590a7e834c5196133054

  • SHA512

    124b11268cae53eee52ff974663c9ea20d46b7174ddec742a69c906d146a3568b258b4ddbdfd25dcc1cd1977f715370ea3c9a2b550ffd3c8e98217db6c7ada42

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gc:1nK6a+qdOOtEvwDpj5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_b2dd4f85c58f5c2765770545fc0c33ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections