General

  • Target

    2024-04-11_79d6b369dabd25a40a78499be5f1bc07_cryptolocker

  • Size

    53KB

  • MD5

    79d6b369dabd25a40a78499be5f1bc07

  • SHA1

    e14fa4c4a668b14792ee77d5ab7899dcc860bfc9

  • SHA256

    0f7607f585b1ad7d5c4be7573b3b501552fff638778f4618d6c3219032a333af

  • SHA512

    90c033c1f3315eaf4c73e25f0bb7311fc65dc38c0a06190883efd325102b1a104604c86edf8b7728af5c89a4e64f8f36264b4fc548a09c4d5ac2de578be4c3ee

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFg6:bP9g/xtCS3Dxx0I

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_79d6b369dabd25a40a78499be5f1bc07_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections