General

  • Target

    2024-06-02_d7627b3ede76fea4ad6544f77832c7e9_cryptolocker

  • Size

    54KB

  • MD5

    d7627b3ede76fea4ad6544f77832c7e9

  • SHA1

    61402a036805300025b29f3a3db33201dd9f9777

  • SHA256

    d10cdad7b7bf53417dd9b3675d13bedf80229c5d54b850fba371de96bd5b5a74

  • SHA512

    c54fb0aba94b1a75cfbd97660d293c6a67254469a2fb85c65ec92721351843a9234209ff1651a4c73f421379386ca9995035cfe1a07f1c52facceeb74a1cdbc5

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgPYe:z6QFElP6n+gKmddpMOtEvwDpj31ikgt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_d7627b3ede76fea4ad6544f77832c7e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections