General

  • Target

    2024-06-08_ade6a0f343a7d1fffe302d22689b1d6b_cryptolocker

  • Size

    68KB

  • MD5

    ade6a0f343a7d1fffe302d22689b1d6b

  • SHA1

    c17f2845e0fe5b0dbf8afbb19bc8f14f0e4ecec9

  • SHA256

    063443f297740451697976e62319b17fb47effa0404acd425f77ddb3b2272ce3

  • SHA512

    15e51cc0d48d722725ba1932a9feec13a38b7cc403a999195bc07318f3f7f55ad3285710edddde8729d007cc9239b550549242dbdc86c1b282f42c998a04fed2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRe:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-08_ade6a0f343a7d1fffe302d22689b1d6b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections