General

  • Target

    2024-04-22_56f4ade50d03e9b923d149fab2450823_cryptolocker

  • Size

    50KB

  • MD5

    56f4ade50d03e9b923d149fab2450823

  • SHA1

    2017f62154db2f15bb1d1a3b3142c00af7823c4f

  • SHA256

    04c8917408a29fb6494557ca69c7f9db576a953de54dddd032b3aabf02e16b6c

  • SHA512

    9faae4fb378c727145e4e3cad6aa412e8f8fd23d4405586144498e8546500176c5c8cc91705cc76e46257fe2dbb677535eb327a740d5267ca83ff116f2cd5986

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvt3y:bODOw9acifAoc+vi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_56f4ade50d03e9b923d149fab2450823_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections