General

  • Target

    2024-06-09_220cfaf770e5b0c676a777e011089d0a_cryptolocker

  • Size

    78KB

  • MD5

    220cfaf770e5b0c676a777e011089d0a

  • SHA1

    d668bfab5f33a13d9fe981ad3fc8cd68514d3f1e

  • SHA256

    72185b34f5415e2d3e203f76ff9fa8b36284342efdd4b3426a8b388207fa721e

  • SHA512

    a95307eebd08de0e271ade04c60981b77169834ce38f74aec09781ff8e3e41c5e723a6bde3005d893855e282d111cff5ecc2e43474cdc6e0754b872d5755456d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1f:T6a+rdOOtEvwDpjNtHPk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_220cfaf770e5b0c676a777e011089d0a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections