General

  • Target

    2024-04-17_956816d0eb919eb6af0076a8624110ed_cryptolocker

  • Size

    54KB

  • MD5

    956816d0eb919eb6af0076a8624110ed

  • SHA1

    63576315b49998da1166a53966438ee69f1b8c83

  • SHA256

    002826b6c08e3c9cebe49d0f1779c69d848677c4c1d7b6f61465388e04059be3

  • SHA512

    ab6a9e816ec45e6586623793b57bee7efe4e95b6a7a14e97648fafd980f58d7e60ccd4e5de25a66570b1247ed84fbbd7c9ff15dce9ccf7e353814b55f6cd4469

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgULE:bP9g/xtCS3Dxx0t

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_956816d0eb919eb6af0076a8624110ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections