General

  • Target

    2024-04-22_4d06a347c71bd4eeb370f75f6407f2f8_cryptolocker

  • Size

    57KB

  • MD5

    4d06a347c71bd4eeb370f75f6407f2f8

  • SHA1

    97c9f06568c696db61c985cf3bb60f9f532c30ee

  • SHA256

    5188bd5e10f27290997ad016729faeefb431501290f39fd3850f0c25a3500441

  • SHA512

    ec694d21cb6575122319ab25be7d9726fede95586c00a85c42115ce266532d1c4637f07954c58200f762fda2469a7606893c7be758ec419e19c7932724e9da2a

  • SSDEEP

    384:UfDu74uGLLQRcsdeQ72ngEr4K7YmE8j6dblQYnrz1ZhdaXFXSCVQTLfjDy6HW:Ufa74zYcgT/Ekdd5QgpwXFXSqQXfjF2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_4d06a347c71bd4eeb370f75f6407f2f8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections