General

  • Target

    2024-04-11_983a681aa43812a3f01368e23fb1b14a_cryptolocker

  • Size

    54KB

  • MD5

    983a681aa43812a3f01368e23fb1b14a

  • SHA1

    600db9ca3861f1d3a4542f538b257bc51e4cb4eb

  • SHA256

    050961a2d986818dc229a529f245181f7b8baff053633782c76c80ca009eeb2b

  • SHA512

    573b75475a0e7978e2512e94e5bd7bc75b948635f7c7e955a90290e1bd4251007b5b172c8ebac3199d6421daf2ab26bbd47c13e061e81f844f9911d2c913b522

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgC2:bP9g/xtCS3Dxx0Q2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_983a681aa43812a3f01368e23fb1b14a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections