General

  • Target

    2024-06-12_4ffe23ac0f1ea82c35d398e465dfda33_cryptolocker

  • Size

    79KB

  • MD5

    4ffe23ac0f1ea82c35d398e465dfda33

  • SHA1

    6079d695d43dd81cde369c79c5d460620100bcff

  • SHA256

    d62dd4729e726395f31d52b2bc2b1d06dca0f1ce989929b31bd5612b20d1f792

  • SHA512

    d625ef1b66f5bfc6995f33e8593796127614a789a677640c7e119ad4ba0fb7cf4f9b83f3ecb703117be835183eca5eaa6a362ebea042fad23529f948e1802a58

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRY:T6a+rdOOtEvwDpjNtF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_4ffe23ac0f1ea82c35d398e465dfda33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections