General

  • Target

    2024-04-21_72cb0ea6a8a07411ec7a8bf2a171a6ce_cryptolocker

  • Size

    89KB

  • MD5

    72cb0ea6a8a07411ec7a8bf2a171a6ce

  • SHA1

    b6336ce6397988c5243af11dc240f657fc552e91

  • SHA256

    be1dc991a8ef5dda80ffd8dd4a37a94c16c8de09aaf1b2a6d66fa0227c6f29a1

  • SHA512

    44f3e2394508a9ea54138804e3db5865cb861b0d1d3c017e4a6547285666786f4338005404ff8962542863f64d38fa924dfc7b26f132ec1e36b1c862df9f58af

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAZ:n6a+1SEOtEvwDpjYYvQd2PS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_72cb0ea6a8a07411ec7a8bf2a171a6ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections