General

  • Target

    2024-06-20_d3f32c9891ab8238b21c0684422b0691_cryptolocker

  • Size

    59KB

  • MD5

    d3f32c9891ab8238b21c0684422b0691

  • SHA1

    d5127131d1e9123de09befc4e8afcf6069030583

  • SHA256

    c0b17920afad2cdcddb3dceb29ae3ed39be519d28c533e2df710ecf902a44e97

  • SHA512

    5a6b3f711214792d8b5dc636b5deda848985448b29117b6df32f23d09a6f0aa804a6d6dcf4a3edb000cfdf101d6e946ce9e58117ecdddfc58b53185fe45d5ed2

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axK3/R:z6QFElP6n+gKmddpMOtEvwDpj9aYaQ/R

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-20_d3f32c9891ab8238b21c0684422b0691_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections