General

  • Target

    2024-04-23_113ff516e8b00779b3f0cbc565416470_cryptolocker

  • Size

    75KB

  • MD5

    113ff516e8b00779b3f0cbc565416470

  • SHA1

    7809f04919018a599f74edcf098461a6aa599bb2

  • SHA256

    76b6eaf3e2edcccec693e8fe4c0a24e7d510db33d91d295571309032a0c69c77

  • SHA512

    6dc96899cca9bbb1fb1870cbf6bcbc0a7fb291659f5f528381f0bffd2944f9e7e38af5da8fffba923049d33afaab1f49af22a51cd71a4ca08e559d8d2a18acc2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFQ:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_113ff516e8b00779b3f0cbc565416470_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections