General

  • Target

    2024-06-01_15362fc4d3bb24a84c7eeabf1d4f5d4b_cryptolocker

  • Size

    57KB

  • MD5

    15362fc4d3bb24a84c7eeabf1d4f5d4b

  • SHA1

    1fb1d6d1de44bd27bd6208ab51ea482bddc81f67

  • SHA256

    6c6c7e3391d058fa989e88d41a4be1070dc8b6748e59f0e7831f0d02619a4f64

  • SHA512

    867b1efac0ac3d177d56f7913bc82108c4e88a6bbceed9baa11510d7bb52a7b1bc72435f4d0fc54cde2c521b23cca7b5f6b7e1369b756a14b2d09316f4d77707

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgz4:bP9g/xtCS3Dxx0n4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_15362fc4d3bb24a84c7eeabf1d4f5d4b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections