General

  • Target

    2024-04-23_24e55abc9d5c56c27dbe2c359e29ab12_cryptolocker

  • Size

    80KB

  • MD5

    24e55abc9d5c56c27dbe2c359e29ab12

  • SHA1

    2b941da8aedff84cc65c4ba0789bc4482a3f6536

  • SHA256

    bfe50eeb9df152177046a58b229fe02fce6b739945eff5d865d542c2d191e508

  • SHA512

    98d978b8c85ac63a95580b9c41c88f1077c305e4ca5180a75803053bba6a2aa6bfc3ac69a973d76681a8bd74ae34c9a0c20e112b3cfb162cfb02df4bcf95acbc

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd2:T6a+rdOOtEvwDpjNt8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_24e55abc9d5c56c27dbe2c359e29ab12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections