General

  • Target

    2024-04-23_4970d1561c49619581b632685300ad04_cryptolocker

  • Size

    65KB

  • MD5

    4970d1561c49619581b632685300ad04

  • SHA1

    281fdd54bc15d307a2af7159b849a7bc52f946a8

  • SHA256

    755b6c2969d0680e8de57e56dbe0015d9b4d5654b9fa0aafc755a15e47a225d6

  • SHA512

    f00d1e203de6405883b389a057a937137d386380043bdc97d24b19cdea3e01f0bc41b09f41bd62a1d3ea344766aa6bf405ecc042046e20b0d549f63dac034efa

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyF:1nK6a+qdOOtEvwDpjy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_4970d1561c49619581b632685300ad04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections