General

  • Target

    2024-04-17_722ff096dfd9f03205313930c7294e64_cryptolocker

  • Size

    74KB

  • MD5

    722ff096dfd9f03205313930c7294e64

  • SHA1

    556af46464b3e002a5bbc29f87448cc1bc302087

  • SHA256

    07107a8e19d7c07d3bc3ef02d9dea57c35cdb204e456e2afe2b0e812304eb8d4

  • SHA512

    3796520b30828b0dc406b61e50255bf46b3fc2e8f58d958d7cbd3dac264142ce3f829b82b0e93d6bc0e434a8cefa1670781b266cbc9f57c263a649ac8d7c08af

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFW:1nK6a+qdOOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_722ff096dfd9f03205313930c7294e64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections