General

  • Target

    2024-04-15_49cef0a66d920ff4c735ff4c2d693730_cryptolocker

  • Size

    83KB

  • MD5

    49cef0a66d920ff4c735ff4c2d693730

  • SHA1

    43efdbe3f17c534743c3e15af943458a193c3e2e

  • SHA256

    fd699d40db27a90f1f3349deaf532b02783b289c2f3a28c599d13dedfe0ffbc2

  • SHA512

    ca6dcb01c05df26951ed992d561f89ccafd5b14ee99fde50b4c5415f1d5256bbab350805e53e3782e61d3c0d4346cb4eae8e16a91f338f81385f0d826c75c475

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vMq:T6a+rdOOtEvwDpjN7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_49cef0a66d920ff4c735ff4c2d693730_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections