General

  • Target

    2024-04-25_6d22f8126ad5ca9d4c6892f4e365d928_cryptolocker

  • Size

    55KB

  • MD5

    6d22f8126ad5ca9d4c6892f4e365d928

  • SHA1

    bca573df684862662602666b38eb8ed85adfadd8

  • SHA256

    d806a17911150777e20eb3cad2884317f2ec892b47c9855e3bade3f2a789af7f

  • SHA512

    e70eef18c4a0ae4d1968fa3c044497d151220868894f23823058c9a0af5d3ff1874309ac0799378bd4097f06bd2792195be69c3e3ae49f3856da0fd819384355

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNs:bP9g/xtCS3Dxx0P

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_6d22f8126ad5ca9d4c6892f4e365d928_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections