General

  • Target

    2024-06-04_7b19f32988ae8dbdbd8b199f571ff2c7_cryptolocker

  • Size

    78KB

  • MD5

    7b19f32988ae8dbdbd8b199f571ff2c7

  • SHA1

    9daaf511ca39de49bae7c83e4ec9c28790054766

  • SHA256

    3f1a520480b6b02f15ccba91902359c1521e9f1d3ff78b160597e3f1ff393c39

  • SHA512

    8d46ba1ac121937f1f5d0f3a3dab057082cdf68ce1ce3f9eb7bb4bb5ff47827f3801d02c19b400b18fda832c5d6e2fca6ad665532cef8f561e51789dfe419963

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxh:T6a+rdOOtEvwDpjNtHPi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_7b19f32988ae8dbdbd8b199f571ff2c7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections