General

  • Target

    2024-06-14_22618a6dcba19f47f3139af0e9f7a6b4_cryptolocker

  • Size

    76KB

  • MD5

    22618a6dcba19f47f3139af0e9f7a6b4

  • SHA1

    0c28f402f2172931bc8c27aab32a129873ba9016

  • SHA256

    b779f165bc9c1c02e3d7aedaf703c4fa4585a8cbe75920df73d208fbb624857d

  • SHA512

    116ac552d01a471d73fec7b03d43bf7ea1670270d85576107e0d9b601e89014c262ed925c160373a2ea2934c24188b544e9578bc2a9b5f3cc43b2e67cca0ac68

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81GS:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_22618a6dcba19f47f3139af0e9f7a6b4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections