General

  • Target

    2024-04-19_865897933c72146a6c6391d13dc4377f_cryptolocker

  • Size

    55KB

  • MD5

    865897933c72146a6c6391d13dc4377f

  • SHA1

    67fe314e1b76ee20b95960e1232479d61d3e6409

  • SHA256

    528c002fb92a01fab3894cdc7c34fe2f8e0d793c0b609496db594415b458372b

  • SHA512

    6af4198550d2234972e3346b41ad716a9892f9fc39794c82f5f9b598dd78f85ee4e62141efeb39d835c796061624384907af11a43528046b5a449647885920af

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlO:bP9g/xtCS3Dxx05

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_865897933c72146a6c6391d13dc4377f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections