General

  • Target

    2024-06-20_1eb67cb39bfe18dbdbb9edc99f54a906_cryptolocker

  • Size

    63KB

  • MD5

    1eb67cb39bfe18dbdbb9edc99f54a906

  • SHA1

    421ca6ab1822405470884b20ea688504e6de67b5

  • SHA256

    ef3d2a4676a3987d4cdf19127f4bc6a63e638a6b012ff652a9922ff59fe4133c

  • SHA512

    eed6e9017790fb14605d13cc983943090018466e6d95db4170d1b3e7932a13fd7c68611bd0c63e7aea899f3bc1ceee09ca1f24dfb037628796b457af3a9e00af

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zy:0j+soPSMOtEvwDpjwizbR9Xwzy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-06-20_1eb67cb39bfe18dbdbb9edc99f54a906_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections