General

  • Target

    2024-04-17_02441ea3fdc3f2b0c8d5b62a964147ce_cryptolocker

  • Size

    49KB

  • MD5

    02441ea3fdc3f2b0c8d5b62a964147ce

  • SHA1

    a9006c070dbbe025e918ce4d0bab605b8f5b5450

  • SHA256

    89d5540fb1322ae99e6b20c5fdd6437510ddecf34bcd3fcf64d174dd1560d928

  • SHA512

    353b1f4d9fe40140c05c86ad8ae9d4b73822a8d22ca5c3f3d01cc7692d9fd3ecbac0e600f5bdc1a9176cf6765c68d276f9a284306532edbb7597f0c1bb86f283

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtr:bODOw9acifAoc+vr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_02441ea3fdc3f2b0c8d5b62a964147ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections