General

  • Target

    2024-04-22_437a2ec2ab9d87bf772eb1b4703fd597_cryptolocker

  • Size

    96KB

  • MD5

    437a2ec2ab9d87bf772eb1b4703fd597

  • SHA1

    799c0ce2f21927aed55d1edebd8cc46e4077dd48

  • SHA256

    cc23c0ab8b1d8e18786682e4f61208226ba22768eef721c4490d280ce72b520b

  • SHA512

    3897cdb00fe98f041efc81ba0999f6362578e89868fcb23c8e0177cd481011d09dcb508c8df8aabf9373c5f5da47b058067a8b8cfdbf611c6bb04cd6f664df1f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/b6q:zCsanOtEvwDpjBD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_437a2ec2ab9d87bf772eb1b4703fd597_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections