General

  • Target

    2024-04-25_508833b5028fac084be657bc7b848bbf_cryptolocker

  • Size

    85KB

  • MD5

    508833b5028fac084be657bc7b848bbf

  • SHA1

    405bf5bbbb2e256b85ac700f96893ef0a009e27e

  • SHA256

    ef9d8c959a029a85703aa2632907b6757cc4816e205f01648a47d892b05903b0

  • SHA512

    d582882483e1b6d614f1ddb0e344b58d9edf64f7fbd73c6418d50a9231902279c54ec90d5a36f6e1bd8c85bcc1c0ca0471959849a4d5afcfc793d3ff5e229be3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R1:T6a+rdOOtEvwDpjNA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_508833b5028fac084be657bc7b848bbf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections