General

  • Target

    2024-06-10_796aa876517d9fb00a6359a6cca89a9b_cryptolocker

  • Size

    91KB

  • MD5

    796aa876517d9fb00a6359a6cca89a9b

  • SHA1

    d212db6b3997b8b8f2f90e3cd455d5a3255645f0

  • SHA256

    463911801a4c52af3d3412be4df6d25886df4f3463520b87bb8de77c93c1dd95

  • SHA512

    1391641cc2005baba7f3554b7ee6de9fa94a885c3ed8fef648d837752177ad19a353e91990babf1c16ba318ac04a2ac559c0fb4ff7d836b5b2bdb042e04f637f

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAyuH:n6a+1SEOtEvwDpjYYvQd2Pz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_796aa876517d9fb00a6359a6cca89a9b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections