General

  • Target

    2024-06-01_4c9ea9916d1ee4f41b6d6d742b3e794d_cryptolocker

  • Size

    79KB

  • MD5

    4c9ea9916d1ee4f41b6d6d742b3e794d

  • SHA1

    5f8069369d16a15770ff82a3dff507103f85bba6

  • SHA256

    8ac77932a693e91c7c13821a48e886807efad6637865a69a7686c948c2eca5eb

  • SHA512

    8b3f36c2702abfdb287c3ec88e0e653385da3bd54e3b4ec399991e72171cdf73f0d3fd8f9842be8daf7c4154301b59c69022ceba4dd6635d7cd9cae620aba82d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1b:T6a+rdOOtEvwDpjNtHPI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_4c9ea9916d1ee4f41b6d6d742b3e794d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections