General

  • Target

    2024-06-11_0f870395c271ed78bf43cad4101153bc_cryptolocker

  • Size

    53KB

  • MD5

    0f870395c271ed78bf43cad4101153bc

  • SHA1

    6479527b1a4c6a7a65d934bb3314d61af9c8626a

  • SHA256

    2f22e73a33ab9878a73b11f5bd882004a3243141b55e886881712d4d7b5dc344

  • SHA512

    519dd17bd739bc85365330d8c4b68239e5161b73955fd92c7ab4f2fe912cd0442782675e8840242033ead0898e355c2202c5db99879a0a8ca06b6af11d23e6c6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTO7:z6QFElP6n+gKmddpMOtEvwDpj31i7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_0f870395c271ed78bf43cad4101153bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections