General

  • Target

    2024-04-18_829dd697c98c712b040a768bc1961784_cryptolocker

  • Size

    76KB

  • MD5

    829dd697c98c712b040a768bc1961784

  • SHA1

    644f5e69a8be12b4100e01856cd34ccc0991b769

  • SHA256

    ca90f96c921bae7cee79f550f5f29017ec5e7b1e20f7a80f30a3b38f76091d89

  • SHA512

    9915e4f020e140647f129a4c9d716fc981d2e96321fcf2246577da134392028eb533d5d0d3ea3a0f35402d9ac79c0a4effb15f7dc4cef063e8eb5c9ab71c3ae0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxf:T6a+rdOOtEvwDpjNtHPY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_829dd697c98c712b040a768bc1961784_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections