General

  • Target

    2024-04-21_4ed03c656587bed1a9e3d7bf08365e39_cryptolocker

  • Size

    78KB

  • MD5

    4ed03c656587bed1a9e3d7bf08365e39

  • SHA1

    33c0f9782a8dba9823a60d6dc4425b4b744a7fab

  • SHA256

    e5840a325936a166c805c12b359621b0929c9e265b965e097f20109dca71b82c

  • SHA512

    88d436373f54715a9098dabb4f0831278e328a889610843a2e5427bc522adf818bb5b721c4c3eb4b89d0ad4002abcdb68d640b6eed2cdddb55278837481daca5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqg:T6a+rdOOtEvwDpjNcr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_4ed03c656587bed1a9e3d7bf08365e39_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections