General

  • Target

    2024-02-24_48ade4615e0fdaa92a8d8cd7ede46f92_cryptolocker

  • Size

    75KB

  • MD5

    48ade4615e0fdaa92a8d8cd7ede46f92

  • SHA1

    4b20c89db38d6fa5e0f822cc0c8f5da6b1aea88a

  • SHA256

    8d00daff62d8db5f313a55edc8fb28d6c8176570d8cc56e42a19453d4eabc286

  • SHA512

    efc4000c06ba2b1a9ac3b8214f1bc0d9b246eea4b01d76dc11d6601f191c35bd66a4202081fc4d828566323d27b38006af50c1d08a01931e6cda251236ed7361

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcVi:T6a+rdOOtEvwDpjNt3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_48ade4615e0fdaa92a8d8cd7ede46f92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections