General

  • Target

    2024-04-23_a43907204544ba5099d9049c0ad6f79a_cryptolocker

  • Size

    55KB

  • MD5

    a43907204544ba5099d9049c0ad6f79a

  • SHA1

    b33dab04fc8553cf39a69e4301a28b0b8b6e9ace

  • SHA256

    6b74980e68c6bf821ef1bc29437c4542797ad4c9cc6fcc73f7489532da9ec9d7

  • SHA512

    aca0e43b8f5b583c2a6aaab82c98c03c1f305722294cde4e26fee95cd63075305e3308768c8cafb4493a23badef34d17b881a33fa73e4c0db8214625570fb640

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlG:bP9g/xtCS3Dxx0J

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_a43907204544ba5099d9049c0ad6f79a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections