General

  • Target

    2024-04-06_4f9d45ee1dcca39b4ecbfb4a521f5859_cryptolocker

  • Size

    64KB

  • MD5

    4f9d45ee1dcca39b4ecbfb4a521f5859

  • SHA1

    064ebc1f1e47c679313e87711ed4661a61131e42

  • SHA256

    e0fce176347e8e2a11a1be8fe6a69e428a773fdd35ebc8f6de810a011ad337a3

  • SHA512

    4aeb6c5f47c45a105f6ba44b95d49a954eb61fe267c1450bf887e2434cb396b15597078ce7bedeb6683cad115b31c039ea37c2da5fd40dada75030bcc15e4413

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xe:1nK6a+qdOOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_4f9d45ee1dcca39b4ecbfb4a521f5859_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections