General

  • Target

    2024-04-22_c2da1574c8d99d462baaa8cb5ccb0b64_cryptolocker

  • Size

    55KB

  • MD5

    c2da1574c8d99d462baaa8cb5ccb0b64

  • SHA1

    dd5a6f8f602f91d65cd4cb65c079ed1b4a4add96

  • SHA256

    60dc9ada601ce68ea8d4f00d2a846eb8f810ecd3e5538938afc073e6c9904881

  • SHA512

    66bbc19cbb2d3bca63000ab2ba4c17547c0bdbd37b0e6420523b9307b6af58f3504b4707d0c5c452273c5809846488b3b80e0497a43cfded4da3ed9a8589eb1c

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlVOw0:bP9g/xtCS3Dxx09w0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_c2da1574c8d99d462baaa8cb5ccb0b64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections