General

  • Target

    2024-04-18_640eb2e139d3a6dedbb6fd6d736835e9_cryptolocker

  • Size

    65KB

  • MD5

    640eb2e139d3a6dedbb6fd6d736835e9

  • SHA1

    48c68eba7f66a69c8adf50bafcf4fc5d088adfeb

  • SHA256

    ad2e007a980825157896fc7bd109cd3b46941a5bc70594e0c8db518972318a92

  • SHA512

    927be0a856fe0ce5c2a57f8fdc0a669e26c28049898f3540d0069c410719f9f002fada1b9bd4d1cf57823ec46cd304f6881d19c417dd5537194f8e64554d8605

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7AK2F:zj+soPSMOtEvwDpj4kpmeLmQlAlF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_640eb2e139d3a6dedbb6fd6d736835e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections