General

  • Target

    2024-06-10_15939a55a6553967be229c80c1d530df_cryptolocker

  • Size

    60KB

  • MD5

    15939a55a6553967be229c80c1d530df

  • SHA1

    1653a8426f881cf664d52083ff248df932dc9427

  • SHA256

    f412879b55d66645fe34a1ed2b808cae635f27b9f3485d3364402ab7b787cf24

  • SHA512

    ce3bc9418ab4c6f98b54ad0ac8983d7d910b2ab0bf31a70b5d3b56ee5c328d40cc8d898dbb934e01408654045f66c42b572efec32607360003ef433c9e238e1a

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjD:H6QFElP6n+gou9cvMOtEvwDpjCpVX6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_15939a55a6553967be229c80c1d530df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections