General

  • Target

    2024-06-08_144ac06260223f1d396fcc50c216a6de_cryptolocker

  • Size

    75KB

  • MD5

    144ac06260223f1d396fcc50c216a6de

  • SHA1

    8ee0e13e1d773f36b68cb5cf8d2ea637c0f04b70

  • SHA256

    fbfa248661ce6ea2f8d33284237157e6cc99d046e372ddad81705f1347456c5e

  • SHA512

    3019054710297d87010747f53382e450a8286581d50ff64a298e8a8e334581138a41f982fe40beb8c42dd59b1236c54cb0600b3355f2451e3ed540412c9a4258

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81GcY:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-08_144ac06260223f1d396fcc50c216a6de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections