General

  • Target

    2024-06-14_7afcce0f183bdbf6b72bcbf19b4402dd_cryptolocker

  • Size

    60KB

  • MD5

    7afcce0f183bdbf6b72bcbf19b4402dd

  • SHA1

    e5cb1a32b73866a5a3285fce605e7a77a2fc8791

  • SHA256

    af87843d48dcfe253712539ba9589e08c256beb645c042e392f78ad017c14286

  • SHA512

    5718634a9101f01b13e2cf0fe800bab67976da1505935b5c4a1b2f2db1941c403b4c11f4422b67c83bf1cd24f7381fb80ee73c448c66d8afc57184353e171282

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhK:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_7afcce0f183bdbf6b72bcbf19b4402dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections