General

  • Target

    2024-04-10_4976e44f9d12ca354d4bdae8e3d742c3_cryptolocker

  • Size

    95KB

  • MD5

    4976e44f9d12ca354d4bdae8e3d742c3

  • SHA1

    7a410c7f5b18ed1fbd6dd0598f34171d2562125b

  • SHA256

    b1e57a5d379057538664c33ba611affac7d35cf7f9898b17f12fa4e3945f60b2

  • SHA512

    7d567ad642cbbdc8599112c5fe9b66c1d74df8db7cd6f589e46b9de9ade4b1bb30e0ae82bcb27eb664d69a71aaf4f73d693775549c528551333d8de7795a1bc9

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bO:zCsanOtEvwDpjBy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_4976e44f9d12ca354d4bdae8e3d742c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections