General

  • Target

    2024-04-24_cb4a929b683570ba2ebe9c1b9aa090d9_cryptolocker

  • Size

    80KB

  • MD5

    cb4a929b683570ba2ebe9c1b9aa090d9

  • SHA1

    c14d3c5c8a0f0125c4dedae271be902ec7cdf160

  • SHA256

    34ccc6a6297dbb4aa3fb5557aa4714e2265f276b1e5644042cb5384913e90e22

  • SHA512

    a391333881916ba4676c5fec02d15af85c0c4daa7ad419c613cd717b1b2393ab95e43b1adf303a4067980f9f58a56bd748a75e2cfd5216c2074c5d7bddbef4ac

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qh:zCsanOtEvwDpjl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_cb4a929b683570ba2ebe9c1b9aa090d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections