General

  • Target

    2024-06-10_67c6522e81fdf82936966345dcb5a60a_cryptolocker

  • Size

    42KB

  • MD5

    67c6522e81fdf82936966345dcb5a60a

  • SHA1

    2e5d40ed1c11c21762d5aebb51a29def04cfd78e

  • SHA256

    19e02a7f75855d73cd44500b02c1e4477456c5a83582a0fb7c6981f8b4e20f25

  • SHA512

    66d38937e6cd31191baa4fb0910d75f2aebc6103842f90fdffbeb7eed5ef0b0b3eabf4991523dcb37c3603f821b36947c5027c23ebcb37b541e17df5d1b34b1c

  • SSDEEP

    768:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoWf:ba6YcA/Xk3wXFXSqAJb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_67c6522e81fdf82936966345dcb5a60a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections