General

  • Target

    2024-04-23_91001678760cfe9a68cc5d60046e2c49_cryptolocker

  • Size

    40KB

  • MD5

    91001678760cfe9a68cc5d60046e2c49

  • SHA1

    ed7836c6e03787a81a00c4defb03203e10cad37d

  • SHA256

    76410f65e97e2750d3b5b08c4fea255acdd274375e40f0292abdcf9c231ff929

  • SHA512

    565422675c33ea1383fc48c04ee15f7cc913567761a7316331207fbb9039a13a6881093681cb86c2f0db0fbc896fea7f7660d929c1f2af63c96b5c3d33d69382

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHetHLk:ba74zYcgT/EkdCQgpwXFXSqQXfj0xK0o

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_91001678760cfe9a68cc5d60046e2c49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections