General

  • Target

    2024-06-01_b1490d3d451dd566c29f380fbabaebad_cryptolocker

  • Size

    53KB

  • MD5

    b1490d3d451dd566c29f380fbabaebad

  • SHA1

    a6db0053a048b5337ef919a02b510b3153da0b9f

  • SHA256

    ec37b60b76ae7c604e1961b0d21d1ff1aef96928ed893a98ea6b4013f3a8011c

  • SHA512

    9e0b1c8d04220643e25d2e8e4b8f4a264ebfbd3321253d60426eee61aa6386beda9055ad2f7c2ecba8e239a6c9597c272424ccbdd013bf0d60ac62efee90c950

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgS:z6QFElP6n+gKmddpMOtEvwDpj31ikgS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_b1490d3d451dd566c29f380fbabaebad_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections