General

  • Target

    2024-06-13_7a9593f6ab1a53f8b52fa52897981a63_cryptolocker

  • Size

    59KB

  • MD5

    7a9593f6ab1a53f8b52fa52897981a63

  • SHA1

    2a394ef4f3e763c885c658458f3264c71566d465

  • SHA256

    ce556f7deb8e009c7191a54a0582be78002407b4d7d1b445274d93fbc281af76

  • SHA512

    e7be092bd9687b9aea1df200ece43f05824e2438dc7a6a2c2b0def938b16c32f53b5af273a14bedd51d11ebfe3d2952bf8fbfcf27241f10635ba54cd4a624be5

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+NV:z6QFElP6n+gKmddpMOtEvwDpj9aYam

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_7a9593f6ab1a53f8b52fa52897981a63_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections