General

  • Target

    2024-04-23_721c6d7dc7a5aef93977a299dd6c21fa_cryptolocker

  • Size

    55KB

  • MD5

    721c6d7dc7a5aef93977a299dd6c21fa

  • SHA1

    7a022d81779d0b31609c5d3121d9b500755da729

  • SHA256

    1a915648828baf9a79050de0c4e0656c79b648ac71d81b1f9c0286c1171e82f6

  • SHA512

    c5189c292238ba1ff279bf511a913b99f3f3208121df5cc77a30c2018e73183eaf40d60c49c2832f3e8e51373e0a79982782a593ccab375b9193a4169b8c310b

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+O:bP9g/xtCS3Dxx0JO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_721c6d7dc7a5aef93977a299dd6c21fa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections