General

  • Target

    2024-02-11_4493debc36876b032d28553496752901_cryptolocker

  • Size

    63KB

  • MD5

    4493debc36876b032d28553496752901

  • SHA1

    2a3864ce5868c260ca4329235b9aac387d415ac4

  • SHA256

    73577f296f809b90d3d30c01e1a66d769c8e43db8e978171f496ca9268994827

  • SHA512

    57e81ec6f3654a94e728a0cb4fbe622a68c5f6265a6cdbb7a8f16a58227132970dce10b932676be4f9796a873a6dabd248bcb983c02d7507642ba0e85e32a6dc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQ:1nK6a+qdOOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_4493debc36876b032d28553496752901_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections