General

  • Target

    2024-04-23_7641d9158059eda00150e4e3b57786d9_cryptolocker

  • Size

    55KB

  • MD5

    7641d9158059eda00150e4e3b57786d9

  • SHA1

    120ae8dff59eae3ee99c538ff43bd2622c444043

  • SHA256

    cf2f926d7fa7ffa889b5108e6679ea9a67a67e33ecf24f978939ad90d05c603f

  • SHA512

    67b6728e9a8e6f03844df4d9b20ac5ae705f02cbe86c2fef071e392f73ff862d847a3b4cdc3ef910771f2dac07d509f32da5f0221f580f58730004e204da3edd

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+Y:bP9g/xtCS3Dxx0JY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_7641d9158059eda00150e4e3b57786d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections