General

  • Target

    2024-04-23_4cd2a613a25e8d6ed28d5de5bb34bffa_cryptolocker

  • Size

    64KB

  • MD5

    4cd2a613a25e8d6ed28d5de5bb34bffa

  • SHA1

    b2fd66d9e58c59c0dbdd53d52349b210705fc944

  • SHA256

    37202acf48129b51db463e1f166c2cb88ab997f6d3b0e030d30a4b7216fe64cb

  • SHA512

    e5de63479f543aecf5a002dc3c189373fbf42a64f8532b7857f91d89eed3ec247fd8f20993fb77a82e5e40b01c36e448582c8f10275c5bc01b06d358dd183e68

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXz:1nK6a+qdOOtEvwDpjz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_4cd2a613a25e8d6ed28d5de5bb34bffa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections