General

  • Target

    2024-06-04_8ee66f233a7cb0ee4b6382cffc1dec8c_cryptolocker

  • Size

    79KB

  • MD5

    8ee66f233a7cb0ee4b6382cffc1dec8c

  • SHA1

    2486fa14e3fc62bd1b2e1fdd09f6f9e5e4535be6

  • SHA256

    68fdf67895ac06da3f9ea4183868fbb0bad80a9e80d40d1c2cce0994bfd85a92

  • SHA512

    4cf21f88aacf67acc06198d7f5655284c106a32b0ba431f012d4a2e8af69809c90a9851748a9418cf8a2ba3b49345f711b852963379916a0e2f72872c604be86

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB16:T6a+rdOOtEvwDpjNtHPN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_8ee66f233a7cb0ee4b6382cffc1dec8c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections