General

  • Target

    2024-04-10_cc413d32fa420ece0dcb2c270da00504_cryptolocker

  • Size

    119KB

  • MD5

    cc413d32fa420ece0dcb2c270da00504

  • SHA1

    3167524029cb4648c984750f648db44870095a48

  • SHA256

    e53d0ccc4a9ea706263761ff9272a817cf02a86845216c4ea82859d2b0f64e8c

  • SHA512

    b29364c72b34515c35d1b2ffe87896024a0affcd30596b3308a42562e14f091b79dc5dc56657bf0d4baca8ab7bac5f6e54d1588fe3e0ba48f03909bef61a8ee4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qats:z6a+CdOOtEvwDpjcz0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_cc413d32fa420ece0dcb2c270da00504_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections