General

  • Target

    2024-04-17_a04fad4cef90359362b3615dc7e8a5af_cryptolocker

  • Size

    79KB

  • MD5

    a04fad4cef90359362b3615dc7e8a5af

  • SHA1

    14b372052622d09366b002a56b430624e70bb4ad

  • SHA256

    5b8535b918e83a906fcc1756756acf90e4d474d2ac6bea190df16258c1163690

  • SHA512

    3f448ba753eb55b1ede4e29111c748ddadac6155828a33dabac24aad3122f031e3ae4dd8d11ca4d94c56cd5bc42298850309e349453d7e6982ce57d0684617c3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QR:zCsanOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_a04fad4cef90359362b3615dc7e8a5af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections