General

  • Target

    2024-04-25_35aa9286152e762ba7dde04b8414f77e_cryptolocker

  • Size

    76KB

  • MD5

    35aa9286152e762ba7dde04b8414f77e

  • SHA1

    104cc4942a1d5116276ff335d5e1cb014778857b

  • SHA256

    e4a65ac1e9ea47663d251b24b89ad409e76933df1a7a6f25289c5a66bb01120d

  • SHA512

    5ae396afc6e62d095692b1c39121deb4a1210d3e6d97fae6670a1b14ab5cb3624ee7afb9d121cf3c7eded27752ede7e9b66c352437e4ad480cd5cc2efea2b587

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxJ:T6a+rdOOtEvwDpjNtHPq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_35aa9286152e762ba7dde04b8414f77e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections