General

  • Target

    2024-04-16_20b4e936925df6ead0172211f856d56f_cryptolocker

  • Size

    95KB

  • MD5

    20b4e936925df6ead0172211f856d56f

  • SHA1

    436d23ebe90a1d13ea78a1ab35ba19429eae6fc5

  • SHA256

    45fa8c1741993d8cfa755fdb90a746b836066a8c5c0ce92e1674a35e54d0ae87

  • SHA512

    be7db32ccd371ec97bba1ea85ad0498e2806e8f52c4f5aea78b5314e98c8155a84e69bbc075408c8b98712a9d9c79fbb3fe29cda1fc9c0db127eafa4cd280cb6

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bO:zCsanOtEvwDpjBC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_20b4e936925df6ead0172211f856d56f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections