General

  • Target

    2024-06-05_614b50d11aa325cf02f37597919ef98a_cryptolocker

  • Size

    67KB

  • MD5

    614b50d11aa325cf02f37597919ef98a

  • SHA1

    25501ae846bbb1324d3cdc9e6e46dfa3fd1c0d35

  • SHA256

    ae59616f8400f7c536927c8ceadbc97811a615881db14af6744ac88ca02ddaab

  • SHA512

    9b5a86c8e00a92739115feba8b89c2ed1d825ce46a8706d3efbd6a49570583a55b24d4ea04a8ff8aedb0a685c1fad451f34bc6a0e4fc1135e354447ac0ba2173

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRpU:1nK6a+qdOOtEvwDpjGU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_614b50d11aa325cf02f37597919ef98a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections