General

  • Target

    2024-04-09_304554a27811a9992f6f3f2966bb8162_cryptolocker

  • Size

    53KB

  • MD5

    304554a27811a9992f6f3f2966bb8162

  • SHA1

    0c8105168267dee00f24f5e3a121b8bf28cd77cc

  • SHA256

    55a778697babbe01170da5c1e6bba309002614e86793bc8b449636485d3a1fab

  • SHA512

    cda8cd675cecbcc90b2b3b00180fe17dfcf07638056c6b4d84b5b2ef1d226bd102d4b739fa04d710741964095bceb7d30c25b5507749d6c1453bce491d02d368

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgC/:bP9g/xtCS3Dxx0Q/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_304554a27811a9992f6f3f2966bb8162_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections