General

  • Target

    2024-06-16_b6b9a4ff8505614375180c4197bdf12a_cryptolocker

  • Size

    94KB

  • MD5

    b6b9a4ff8505614375180c4197bdf12a

  • SHA1

    fdae8820ba86624f6b5779b532cec74db65999af

  • SHA256

    b82654957449874b70ce7def777f4a58482c0505688c59325d8506d97c5fa861

  • SHA512

    869950b1e2fb3c25f47e3dcda7f5eedd67c067831405886d884ef6da9f5b80df9a48e5ca3499740f2cc6a70b455631e144cac4565fb6a61a746d8c5bd95f19f6

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kb:zCsanOtEvwDpjB4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-16_b6b9a4ff8505614375180c4197bdf12a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections