General

  • Target

    2024-04-20_4e414d1bf1272b6bead54118c2fbf7ee_cryptolocker

  • Size

    65KB

  • MD5

    4e414d1bf1272b6bead54118c2fbf7ee

  • SHA1

    e5c0af948e4c7b77cc452ff17eff386db9c7c771

  • SHA256

    0c4b5aae3db0c2744ba4b95be35029e0d543755a44d2d8d5ef9073e1cfda39e7

  • SHA512

    c2eaa934c750c9418bd56342a79b7a3555ba05a0b5c5c19e17488a3fcf7f246b7593e4ce34dd09ee91e7b8053d5e2c40b5faa5459e731257d190595f6d0d0862

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5Be:zj+soPSMOtEvwDpj4kpmeLmQ/e

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_4e414d1bf1272b6bead54118c2fbf7ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections