General

  • Target

    2024-04-17_584e9daafdacb3fc3784835891098c64_cryptolocker

  • Size

    109KB

  • MD5

    584e9daafdacb3fc3784835891098c64

  • SHA1

    ec212025600cfa4d22954b936098e207b417bf9e

  • SHA256

    30f8fe697ec618b721de76c95050f607ba2ffa4ebfcd938eb997f43c294cea27

  • SHA512

    b743f698206c30f4ea00f9df25f6ae12eb02311e56f9368a0bdc58ff099385472ea8a97fabf7388cc78e32599ad8c93e59ab04c8b5121c72446e7c091046bc04

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMgW:z6a+CdOOtEvwDpjczq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_584e9daafdacb3fc3784835891098c64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections