General

  • Target

    2024-04-24_edc746e09b299a5fd299e14ce51923b9_cryptolocker

  • Size

    40KB

  • MD5

    edc746e09b299a5fd299e14ce51923b9

  • SHA1

    f608e9ba1994a06741fb41335f4e10365a6747fb

  • SHA256

    6aff46423e3226d4805c6877721ad7c5abdf1252dfaea8314955e416b1471650

  • SHA512

    450df82696f778fdff28384901f164620e69329a8c658cbe61c3a3e8e16a9e14eb6c85636eab09508966d2b84a468ed0f926c1bb64f4e7fdce8fed5d14320391

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHG:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_edc746e09b299a5fd299e14ce51923b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections