General

  • Target

    2024-06-02_c6c901f08e7bbb1ca211a49a315479b8_cryptolocker

  • Size

    85KB

  • MD5

    c6c901f08e7bbb1ca211a49a315479b8

  • SHA1

    58221e3035852a67404bbc2c84b6c8d0998f2098

  • SHA256

    ead308c7383c29b33a28e137d5145a1ebf9840eb0d30dd8675ade254fa07e5b1

  • SHA512

    c193fd0aa91d50b506a12fa5c62e6133a41221659bb0dd08cef549e830c2486654bf8657bab5c68c581ee528408b0ee1487c9f86c07cef84796306645dedc300

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1r:zCsanOtEvwDpjh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_c6c901f08e7bbb1ca211a49a315479b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections