General

  • Target

    2024-06-14_80ff47f9e9ef6d8ccd7b49a0dd1dc907_cryptolocker

  • Size

    25KB

  • MD5

    80ff47f9e9ef6d8ccd7b49a0dd1dc907

  • SHA1

    6a2764301a3e9c1032539e17c0b16a95c62063f1

  • SHA256

    d18a76c486e6764084a8e5101f2b9eee9881bdd2dd9a811e06789dc435a5783c

  • SHA512

    6afaaf5ff0fe40825ea06f0269af3a2feb8259f413105adcef29699fee5ceb90e4eca5a724082906688cd409ff95ea3da1ccf86d91f47c71c078e766d8376176

  • SSDEEP

    384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTU:bYOdVB2jXUrMkvnbcuyD7UFXOY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_80ff47f9e9ef6d8ccd7b49a0dd1dc907_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections