General

  • Target

    2024-06-16_614d89642211dfe43ab7e88d5d0abb5d_cryptolocker

  • Size

    67KB

  • MD5

    614d89642211dfe43ab7e88d5d0abb5d

  • SHA1

    8fe2ad90280ae0fe7e86f3dba76b88607249c0a3

  • SHA256

    b16eda786d4f27d7de8f0b8d43cc904b538813900168aec62eab7d6c31bc324b

  • SHA512

    8eaa6fde0b7dedb6711624b3862cb9cf382411d08f118d4699d20a5ead5e87124dc69e937ea6c9c7092c97897d18b7214ec804fdcad77ab32d46d139799a57d8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQR0:1nK6a+qdOOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-16_614d89642211dfe43ab7e88d5d0abb5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections