General

  • Target

    2024-04-19_194164656c27879d60952ce9d7e8d3ec_cryptolocker

  • Size

    39KB

  • MD5

    194164656c27879d60952ce9d7e8d3ec

  • SHA1

    bd0ed5ce50acbfbeb60940ef941f6f0f4f9aa432

  • SHA256

    6da500acb9b0d75c43870ab43faf200dc11c7d9b2c1ba123c9242bc36e600b0e

  • SHA512

    f6d2185761839ff038269ae83f536870b65864c88baae01b71986e105231ed1b2a5a4415b8e722374da52adf530ba19ac2424b867d3678fdceb802ed3375bb0a

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHY:ba74zYcgT/EkdCQgpwXFXSqQXfj0xK4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_194164656c27879d60952ce9d7e8d3ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections