General

  • Target

    2024-06-12_7f84d4e10b0693788dba526266651358_cryptolocker

  • Size

    91KB

  • MD5

    7f84d4e10b0693788dba526266651358

  • SHA1

    85f084c4c29faf7f0ab51d5330bc624b4a90698d

  • SHA256

    156e625fdaf4e9f2c76b34afe9e964064cd426822361f9457c15c32ec2ab9b30

  • SHA512

    386741fc5e4f1016ab24ccb0e376ff58b19293243d06d0a3cbfcad5b267321892631face68e087a011f5437f95cb66b218290ec3831235b0ac8a9d9cae9def40

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/y2:n6a+1SEOtEvwDpjYYvQd2PW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_7f84d4e10b0693788dba526266651358_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections