General

  • Target

    2024-04-04_094c82491fd8c5c6d40252f72e83941e_cryptolocker

  • Size

    84KB

  • MD5

    094c82491fd8c5c6d40252f72e83941e

  • SHA1

    4cdb6dcb29e0271ce3e3afd7fb5b14e0a32bad7b

  • SHA256

    5794f5965c4b2cdfd814c8b7740d609d7ec26ae1ee7d514c69b3e10549277284

  • SHA512

    51751e42e84c6ca3272ac5cc242eeae8f42428f4f8d3a3c8ee73615152708229f9302b96a9b73f379d85b013451252f0a2d2a5cbd8cc3a36228aee4f0184aea9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT75Qh:T6a+rdOOtEvwDpjNC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_094c82491fd8c5c6d40252f72e83941e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections