General

  • Target

    2024-04-24_e4609d464cb749d984ebdea5a27e8b84_cryptolocker

  • Size

    55KB

  • MD5

    e4609d464cb749d984ebdea5a27e8b84

  • SHA1

    ff76d141819db6da698a37b523b38786af641d1b

  • SHA256

    590c3dc1c0e310516ac077715fe934e60cc9615333c5c8b2a8bb536e26c87a3f

  • SHA512

    a453f49a562c4d87b107c671fe4f6c4a70f1e112dac44875a9ec815c045a8d85837f1d45cb0438c869f7ccf8c7b6069a9158de7546440b663ee56fb361aa282a

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+x3:bP9g/xtCS3Dxx0Jx3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_e4609d464cb749d984ebdea5a27e8b84_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections