General

  • Target

    2024-03-28_442b9e28ea740aa729aeddea2e662d52_cryptolocker

  • Size

    66KB

  • MD5

    442b9e28ea740aa729aeddea2e662d52

  • SHA1

    54a417678fb760f5f39326e90eef37ee6c4336ca

  • SHA256

    076e3cf55e7b99d1b1aadade79628622708f28cd3cb748d41912eaaa0e0e8397

  • SHA512

    ca12f3213d28b356efc2e211b09c5fcac4383a190e95617e49da609c762a755734223877028cc5df19e15aa7c7c9c57686fc89c32939ca03123ffbb0975a9513

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fs:T6a+rdOOtEvwDpjNM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_442b9e28ea740aa729aeddea2e662d52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections