General

  • Target

    2024-04-10_922a5b2a11364ca81a1b3c9224cea900_cryptolocker

  • Size

    117KB

  • MD5

    922a5b2a11364ca81a1b3c9224cea900

  • SHA1

    102368a39775b39076e5d72f360f36a19c744b47

  • SHA256

    7394d9e6986a37e7ad8b2155057612e585b9c9d11697c70418a6f652d395f5f9

  • SHA512

    5b3c12687eefc658cdf0eaeb793d7e2945b7de44a123e903c7a8cb2a31976612a300d87fbd4c13d08376848b705ada947746917e5f6ba07a1efe2ff2805e3476

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpYICSf:z6a+CdOOtEvwDpjcz8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_922a5b2a11364ca81a1b3c9224cea900_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections