General

  • Target

    2024-04-22_502c47f64182d0352f0cfdd57d726ed4_cryptolocker

  • Size

    99KB

  • MD5

    502c47f64182d0352f0cfdd57d726ed4

  • SHA1

    27bcf61df06a8e3fa3f4fb7db87fd0dbd06413a2

  • SHA256

    2067bcefec656d3f9d631447f79d4527ca1188740d4c3a8236ae8338b1b9bab4

  • SHA512

    25c7a4ceef13bd6da6c276793189a9aecd4b89321eaa55476be85ea30176a543ea5270c81282921047986be0f631d21da1c6890e93bd45b3d21e025bdb31e505

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiX7o:z6a+CdOOtEvwDpjcw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_502c47f64182d0352f0cfdd57d726ed4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections