General

  • Target

    2024-04-22_781cea49d317de20d60cc53b927fb91d_cryptolocker

  • Size

    79KB

  • MD5

    781cea49d317de20d60cc53b927fb91d

  • SHA1

    99ca8fdb7b84ed6dff30043b1ee8b124a95234a1

  • SHA256

    74ff19189d03d97aef1cec4af96e677ef76bc0c9914e585ae69f9727c2f7e8ec

  • SHA512

    961cb5ce17dc4f370f23bc3a505081f08922b263acb627fb141a6f3774f41dd0dee6e94f34b41e299137091ae4539a4f7b5273d4d68c6fd6c1dfc5872db1af2a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdM:T6a+rdOOtEvwDpjNt2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_781cea49d317de20d60cc53b927fb91d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections