General

  • Target

    2024-04-08_41b2e2171324a60f9b5453cdb5e586b0_cryptolocker

  • Size

    58KB

  • MD5

    41b2e2171324a60f9b5453cdb5e586b0

  • SHA1

    671ecbeef80370ad40f56590d440b34682d08faf

  • SHA256

    026c95a89eada5e4f7ac319729e3222a9cc807fc9e8dd14d1ace1e866536898d

  • SHA512

    bb06ea2cefd15a532f7b65e2376aafa43be3f926aebc5ec82f9d67514295325433662d8bdf96f5830e8e74825deb1ea1b06e081c516cfc03d70c0c1ed5f52cfc

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYazbkeX:z6a+CdOOtEvwDpjQ5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_41b2e2171324a60f9b5453cdb5e586b0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections