General

  • Target

    2024-06-02_07bd1363b6514d07a72551813094e390_cryptolocker

  • Size

    61KB

  • MD5

    07bd1363b6514d07a72551813094e390

  • SHA1

    ff302c99aa2f06e1d6a22c14a965d81d3967b57a

  • SHA256

    e78b714f9593f9b8131f40dc6b7e7c4497b6326691a3d5838182c4bc6b862aa4

  • SHA512

    de63e8f5274f48e2c47e816ad8e297be881b7179c88d6f73eb50887922c495f3708db690de9d6e6dfb114c4c4ed65707ceb489bad57105262ce54f453f51ff29

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3I:z6a+CdOOtEvwDpjQb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_07bd1363b6514d07a72551813094e390_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections