General

  • Target

    2024-06-02_640b89019eaef1ca439f9bdcd5e745f1_cryptolocker

  • Size

    78KB

  • MD5

    640b89019eaef1ca439f9bdcd5e745f1

  • SHA1

    b56ec29050233189fa0cdf8b893bcb866644423d

  • SHA256

    a3ca6d3c734dd370dd841eae4bfbfe915016eca47e5bb9eb8ec78bf3931ef4e4

  • SHA512

    8d5e99e777d9344f9e43b882aa4affce796a0414aa58f074769627b4a50a8d2f88577bc3b26619943fa0322402f1b08da99e5b92cea27338204874a08f61d1f8

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnX:T6a+rdOOtEvwDpjNtHP4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_640b89019eaef1ca439f9bdcd5e745f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections