General

  • Target

    2024-06-04_7b191f4e53bf9c9220b2e4ea665d3b4c_cryptolocker

  • Size

    54KB

  • MD5

    7b191f4e53bf9c9220b2e4ea665d3b4c

  • SHA1

    397d1407457cc2b6edfaca0683c0daa5a2fe1835

  • SHA256

    c4f3fa3e11e6a17fab83f0de612c813799e5a78410e77682ead529f1b5324e1f

  • SHA512

    abe105d4e204f75386dec15e62589f2f485cfa52c7a747e952ac050d95180c80acac72477458026b256c77e79074d558218d9024ad53e6c6eca26b52a138b6e4

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkaY:z6QFElP6n+gKmddpMOtEvwDpj31ikf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_7b191f4e53bf9c9220b2e4ea665d3b4c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections