General

  • Target

    2024-04-20_4749ece6ce51f46e9b2e70a98d1a4384_cryptolocker

  • Size

    88KB

  • MD5

    4749ece6ce51f46e9b2e70a98d1a4384

  • SHA1

    ef83d29adf02f1d52dddd53936fcfbb8f802e3f8

  • SHA256

    cf4908d2929f6cdf0aa72bf028e1a2b65994585dfabf4c7797e5ce53c416327e

  • SHA512

    6bc12feeaad7dcaaddaf4bfe217134d0ae0c78db1bc95ceba4b5f74a3b198523be36aff5dc502fa852763804fd1f66ef52d72a5d215433499a15dd5daa5b7152

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblK:zCsanOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_4749ece6ce51f46e9b2e70a98d1a4384_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections