General

  • Target

    2024-06-02_86a5c6d2e709a4289f29772ded8dbf71_cryptolocker

  • Size

    65KB

  • MD5

    86a5c6d2e709a4289f29772ded8dbf71

  • SHA1

    878f229cf7a4cb260e3c13707b053cc7d53f572e

  • SHA256

    9eb39e7e8cb7d53e2e6ed2e948d6b9f665b9b304885610fb59266820b3130845

  • SHA512

    3cf6743e9134e253a5a8603fde27ba185e33b142820334b5e7ce057a2e1a58d6d7f489e80dae9f6c4afa397d6a53c808d72c85e92c8e9b5813519ce7e00672a7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xq:1nK6a+qdOOtEvwDpjA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_86a5c6d2e709a4289f29772ded8dbf71_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections