General

  • Target

    2024-04-24_54942f9a0b15b49e163d3247ca2a3fd3_cryptolocker

  • Size

    55KB

  • MD5

    54942f9a0b15b49e163d3247ca2a3fd3

  • SHA1

    7532be29cb580c9c5f772817b7a474c833dd5f55

  • SHA256

    f30af16ece80fd2c407085e3a0a7912a724e6f3000717d195adcf32758263beb

  • SHA512

    904ffdb5886f41c1432770154b334aa77ff251d2c01b2cdfbbad7ee25506f676e49b95624214ef1a71507ca6bf0fc136d1acea22fb9794dd1839fe2dc9269151

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNq:bP9g/xtCS3Dxx0l

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_54942f9a0b15b49e163d3247ca2a3fd3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections