General

  • Target

    2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker

  • Size

    81KB

  • MD5

    1c6e1682568d4162f2b47211d17a788b

  • SHA1

    2bdab7e17eef3bd5ec0c3e99a0dbd3d665a5d1b0

  • SHA256

    c27a9215702b6ed2f2a6908e8a3f0b207a1cd9920b0b2000cc937efe0e6aee50

  • SHA512

    590ed1d26925d19db50bafbf284209749bf3c62c7231876c7acc812762a1a2131c8b86cb912b64d7354c75f8fe1db00c0ed2ff1ab5ba7a7e9a1fdd709e814dbe

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qq:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections