General

  • Target

    2024-04-19_1e4a0487b5512126d9aff78b0b325033_cryptolocker

  • Size

    88KB

  • MD5

    1e4a0487b5512126d9aff78b0b325033

  • SHA1

    ddecf4293cff80c85f998aa01c1cbeb8e2303357

  • SHA256

    45e370c959cafdd6901fa68fc359e6448beac51e300ff97e4b07a4fb04c166bf

  • SHA512

    60a3fb84e609cd1da6422d63cb671b6273d8c021aa75c5b5fecd814f15d95b0daff820b7216acd464dd58c3889df89ade514217b34714954de1a1f27be7f604b

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA9:n6a+1SEOtEvwDpjYYvQd2Pu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_1e4a0487b5512126d9aff78b0b325033_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections