General

  • Target

    2024-06-09_0d63cf75f46b4beb17e734cf3d92a0ed_cryptolocker

  • Size

    63KB

  • MD5

    0d63cf75f46b4beb17e734cf3d92a0ed

  • SHA1

    ef4036f7d7dfec5aef5dd7c78f703a6bb4cdfd2f

  • SHA256

    c46daf51fa6ae5abb46cf8b175e89a1766bcb2e73cfd63ee6fa983e2dc0d68ae

  • SHA512

    b5984e51c007b9cf3a14c85473f346c49aee3b4edf6387fa1143292c55c5163dfe8626a91a73b496aeacbc893e689d0587e99e214e4593109c7f58ac7ba73b3b

  • SSDEEP

    1536:q6QFElP6n+gxmddpMOtEvwDpjpizbR9XwzH:q6a+rdOOtEvwDpjwPvwD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-06-09_0d63cf75f46b4beb17e734cf3d92a0ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections