General

  • Target

    2024-06-04_f7e151e602707fc4630b933becda4fbe_cryptolocker

  • Size

    90KB

  • MD5

    f7e151e602707fc4630b933becda4fbe

  • SHA1

    ba900973483cf81f718defa69ad9f026d1d20ff4

  • SHA256

    7a88b560ae7b5788be5a3fa86ae1c51d863867d521a1a6803fe4273727b82d99

  • SHA512

    914863e75e3d70ff6e0aa83eedb54605850fe36295d8a41a9b3b5842e905f76dc1787c65882453d4e858dbd0bd5ee1710945942d5c507ab6ed0f15603fcebd38

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAx:n6a+1SEOtEvwDpjYYvQd2Px

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_f7e151e602707fc4630b933becda4fbe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections