General

  • Target

    2024-04-19_ed7d9a9514965582d544a27cd7308cf0_cryptolocker

  • Size

    55KB

  • MD5

    ed7d9a9514965582d544a27cd7308cf0

  • SHA1

    f2290b5a6d52b0b2603a35e716048fb1f7f52527

  • SHA256

    eb92dc2de870285796cc7459d50c97876baae46b71217ab76c43914fb3a08d20

  • SHA512

    0d890095b61c1bc4ff31ddf6a8d93737462c9c472c81972a3a0493663a9bfc4f95119abe0db9b55c39bd80717d7b174dc6093377967689a250aa03c5a57045f0

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl4:bP9g/xtCS3Dxx0L

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_ed7d9a9514965582d544a27cd7308cf0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections