General

  • Target

    2024-04-09_94eaa18d5dfbf16017406668ccf9fcef_cryptolocker

  • Size

    53KB

  • MD5

    94eaa18d5dfbf16017406668ccf9fcef

  • SHA1

    3aa7d96b5ccacb36cbe17a56532e6e54167913ef

  • SHA256

    c4c163d9e21dc2f85d42f8c1a27048c5cc6f487d7d0907f4ae7f224bf0a6bfd2

  • SHA512

    a490ab0cddc4de94146bcacadad2f2c242d683c6ec5d73f3bc1d21d7820a00479cecc3cd8a43547dc9e245c141425af25d661375327be57f56692e2e477880d9

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgf:bP9g/xtCS3Dxx0Z

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_94eaa18d5dfbf16017406668ccf9fcef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections