General

  • Target

    2024-06-14_6110c4ffc15d0e8f3779bdce38b02579_cryptolocker

  • Size

    79KB

  • MD5

    6110c4ffc15d0e8f3779bdce38b02579

  • SHA1

    03e91257de1bbd5cad148a3763c0105e7ff6b3ca

  • SHA256

    d26f35481f6c471cecea0c5e908f48819607b4e8539d4b2dbf19d48a40257510

  • SHA512

    c8590cc5db84d4ab0141d662645617b9d9580980f50ff9bcf342b1e7738d1c4f16e302eb99e2dbbcdee3bd4fec28af06054996d2cbb56d68099dc2d2f8a492c3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnt:T6a+rdOOtEvwDpjNtHPW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_6110c4ffc15d0e8f3779bdce38b02579_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections