General

  • Target

    2024-06-03_6200be8057335a0f6273eeeea1defb8b_cryptolocker

  • Size

    95KB

  • MD5

    6200be8057335a0f6273eeeea1defb8b

  • SHA1

    495e19548e818b80d5d626fa665dad5620d440aa

  • SHA256

    50dfb3114479f95d3a6dfa5d9e4b44aa294ea1a04ca9b71cc47ef56c87e307b7

  • SHA512

    65a439a2508f97b0a35096e28d2baee5960f1492bdba4f442b2f443099332d2eb6da9c011149a03df57c1b2dbbc672d8888ae55e3db138519fcddc91950501dc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kC:zCsanOtEvwDpjBN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_6200be8057335a0f6273eeeea1defb8b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections