General

  • Target

    2024-06-04_26962f003e79f503a6cb5cd3c5c7b3d7_cryptolocker

  • Size

    67KB

  • MD5

    26962f003e79f503a6cb5cd3c5c7b3d7

  • SHA1

    ab6006f1b3694f840483cc4da35c523db967b8fb

  • SHA256

    0f16c9b4385ca6789f2af4ab770ada6b2042f32a630d29a721fd4f45c3173241

  • SHA512

    83acbd133c86bd75a0f50d79a1680846b5b7d19414dce81adbbbb3379e4e88d4a4e236fb27a248327ddfe1ba2cf798cca9978ffc03b2217c4f2cb3a4dcc65f9d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQR2:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_26962f003e79f503a6cb5cd3c5c7b3d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections