General

  • Target

    2024-06-09_7f4886a388ab354cf32555622122f367_cryptolocker

  • Size

    59KB

  • MD5

    7f4886a388ab354cf32555622122f367

  • SHA1

    9138ac8daffcdc4e074811975638cf4d8e87f507

  • SHA256

    2c11c0fe277eccfede45d66e38bd3a5d76e15f0eadc6273b0e61b5b6e1310931

  • SHA512

    abedd7efcc929f8a7073d19a86dc456f3ffbc27f362f2649da7924d9b8c64bdffc655c661a4cf73e6860affac8f97baec2ead4d769a4bb02e58cdddd39cf394f

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qb:H6QFElP6n+gou9cvMOtEvwDpjCpVXhb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_7f4886a388ab354cf32555622122f367_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections