General

  • Target

    2024-06-15_5c1a2aa144c844985b4c670c71920a8f_cryptolocker

  • Size

    61KB

  • MD5

    5c1a2aa144c844985b4c670c71920a8f

  • SHA1

    a6beef5c762d48732a33f7b62569086c75622a95

  • SHA256

    a3cc35a49e5c73eb995915abd53d2f263650e6ba614e44746294f0279a28fca7

  • SHA512

    40a5cccfe5f32777f18559bce54487440235b5ce4e04fa6e65d4237b590912878bc28a48af5ce5a72f13e067c14f3c60de60ee331b803f9bc5dbe45eae6d6136

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pU2R:H6QFElP6n+gou9cvMOtEvwDpjCpVXHR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-15_5c1a2aa144c844985b4c670c71920a8f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections