General

  • Target

    2024-06-09_244d62d7850008b113e8de7739a4316d_cryptolocker

  • Size

    75KB

  • MD5

    244d62d7850008b113e8de7739a4316d

  • SHA1

    591fca13ed0ea172df47e3e64f11d4c0512f5c95

  • SHA256

    621b0db347f675ef4576aa1ad31af2c240972901c112c3f1c5ff1356f941f2f3

  • SHA512

    608009bff67f2cd6db88f6b606fce1505408a0dc3d47b54e65b046f6621b4cd69ee4ef8ee93d108a95b627bfe968ccef407233a51f3b309c1398f4d5a12e4b64

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81GF:1nK6a+qdOOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_244d62d7850008b113e8de7739a4316d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections