General

  • Target

    2024-04-23_a43821bdcbc59dff75e7cbb7905468e5_cryptolocker

  • Size

    89KB

  • MD5

    a43821bdcbc59dff75e7cbb7905468e5

  • SHA1

    e8b1d4cd74dc2fe40977d846be94985e5038efcb

  • SHA256

    c98801b9d23c5abc1f4265125a98c566e69849a0d7f01a997a5710059bc8044d

  • SHA512

    d6bfc01da62aa1149ca57e59e8787e15e31a62c3dd0152e4695ab885cc431af349878dc4651ca7636b2b690ebfbd78638aa910cd874ba01a76f96377af59e63b

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAe:H6a+uSEOtEvwDpjrYvQd2Pe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_a43821bdcbc59dff75e7cbb7905468e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections