General

  • Target

    2024-06-12_a6683f5511668e0783b8b02779f1933c_cryptolocker

  • Size

    57KB

  • MD5

    a6683f5511668e0783b8b02779f1933c

  • SHA1

    0eb25ef89a007800be16b00a5e2df847cdcb0ded

  • SHA256

    3c465b3e73df77d2fb3b74103c94479a071dd5d5c1aa4572263d9df4e9ec99f6

  • SHA512

    b26a1819985511b7eacd41bbafb054c7b518cb959570275cf28f6820568fec106af57832c0b824e18e3c51a1c0db0893f385a2ae14c503b330b246514de12b76

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjls:bP9g/xtCS3Dxx0n

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_a6683f5511668e0783b8b02779f1933c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections