General

  • Target

    2024-04-18_0535e6105e43e80c061cc330b23a3fde_cryptolocker

  • Size

    99KB

  • MD5

    0535e6105e43e80c061cc330b23a3fde

  • SHA1

    bb8e5383adfea4cb0f6186a2a3db706a6ae66c58

  • SHA256

    49f9456db088bda8f41f7e27e96450fa12bb7630d4a3b224f1b00b9b45ae5854

  • SHA512

    9f027bf9d17b0b83c2839982379b4af5f742539555c386ff9a286b5b1f30384360d3e75eeece797337576d2762e68886efcae3ab21ab6e9eb92c5edc055f64a6

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiX6:z6a+CdOOtEvwDpjcG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_0535e6105e43e80c061cc330b23a3fde_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections