General

  • Target

    2024-04-17_d498f54945a6048472f906904ebe0d92_cryptolocker

  • Size

    76KB

  • MD5

    d498f54945a6048472f906904ebe0d92

  • SHA1

    230ec7940a3b5f52b1f965682e97b03b9b6053ac

  • SHA256

    24125076e713dd5c12ebfee8f9cb5d67f9ce6d1981e89223a50aac954087fae3

  • SHA512

    19812210cd94fba00ae6f9f3821d329189a0316fe30c4fb635e2e349cddf827d45dfafd86d773ec2a07f8c44d064ed44705554de771350433da5d0631534a4b4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxO:T6a+rdOOtEvwDpjNtHPN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_d498f54945a6048472f906904ebe0d92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections