General

  • Target

    2024-06-09_69f09b175bbc7563033b8463d064970e_cryptolocker

  • Size

    89KB

  • MD5

    69f09b175bbc7563033b8463d064970e

  • SHA1

    c91b480fb5751fc57e736723ef9b2d61fb4bd937

  • SHA256

    1fb784638a2c068c4cf72baf214fda76d80f2140c067083eee0c967cd7eb0ecb

  • SHA512

    edc225a2e479b9729d3bfca2bd9a423e00fc3fba186eb6bd9b7c5213444218ef86df26f2d823c0b2d63e400823c8a0043128b57f43f7f6eaa86fcb335001bedc

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAu:n6a+1SEOtEvwDpjYYvQd2Pu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_69f09b175bbc7563033b8463d064970e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections