General

  • Target

    2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker

  • Size

    89KB

  • MD5

    4ecdc6ec73a4e6fcf297a882cc2fe5d9

  • SHA1

    d810dc4359960cb512125ad57b2bb0cc13adf350

  • SHA256

    7df96ca9c551caa33518ee96459f6abcf92fd7c9dce63773d7224095a9464a36

  • SHA512

    52a3355a3e53ebc3131007e6de00e1e115eb88c225f0c9d9e3449afa69ab7083909589768f07d135b0d9abc2111f7e5f01ce168fb7411c55be64e3ba7432c677

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAu:n6a+1SEOtEvwDpjYYvQd2Pu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections