General

  • Target

    2024-06-07_b9b49e53daf7a16d0359965eec47cb52_cryptolocker

  • Size

    78KB

  • MD5

    b9b49e53daf7a16d0359965eec47cb52

  • SHA1

    ac78794949bb8211eeb4557f3fa018e4adb7d01c

  • SHA256

    8ea0fe1e2d788f15e91a21a06dfed61e56ea43307083b95be83e320b28b64249

  • SHA512

    b68db6e02e0c732e3f1d73f9240cb37ac42019ba99f0a0cb35ae193a8a883a271a5210f52ca321639b3b917a6185333b14dac614d0a85572ec05cebf32f47d63

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnc:T6a+rdOOtEvwDpjNtHPr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-07_b9b49e53daf7a16d0359965eec47cb52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections