General

  • Target

    2024-04-24_c4924257816e2a601fc8004fe58ff1d5_cryptolocker

  • Size

    52KB

  • MD5

    c4924257816e2a601fc8004fe58ff1d5

  • SHA1

    b1edf3aaddca5318e5fe39657bb682c957ffdffe

  • SHA256

    1ce7d2b24376d98f116e6a6f7fd82d94fbfdc87572b6e5e9155c9158c89204e2

  • SHA512

    98dd3b7eed32fb3836204782b2dbe76f56b549cd17c5d78a06f3b351d89ef27c4c756def36cb9443694ed281402504256a5401477142a7c24a2b44bd142cc752

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOklo:z6QFElP6n+gKmddpMOtEvwDpj31iklo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_c4924257816e2a601fc8004fe58ff1d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections