General

  • Target

    2024-04-16_4fbc434747012e4d6ccf3dea8b2064f1_cryptolocker

  • Size

    39KB

  • MD5

    4fbc434747012e4d6ccf3dea8b2064f1

  • SHA1

    80c811d021c9ab5ffa79d7963dde90f245acef21

  • SHA256

    dc4a9283ab9270b9ae3663de78a0d9f9472ec9505af569183671207c1b925a53

  • SHA512

    7eaca92772818c0b654bb1cb96eeb78962a27b6231e704964697b06b10ca433472330d3b28735a63f0833049810aa9ddc33fac86dadbd459de7d7e9000ba68a2

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHI:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_4fbc434747012e4d6ccf3dea8b2064f1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections