General

  • Target

    2024-04-20_0a9477f00465b8571a8b80d8c910bd13_cryptolocker

  • Size

    40KB

  • MD5

    0a9477f00465b8571a8b80d8c910bd13

  • SHA1

    5d2757463016a70a7a9854f33551442df7c57698

  • SHA256

    92b6541a5ce82490c33ddf853b3d370ce5b070a244b71177bf735d820aea3bad

  • SHA512

    468b8e2fd4652746774f3edbd7f1240d1b2c2936b8b9a7f1ad1730526e5f706497ef27d6515279093feb0ea35f1e4794f8e8bc3fdd3c7fdb5530a6114eae7011

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHQ:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_0a9477f00465b8571a8b80d8c910bd13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections