General

  • Target

    2024-04-25_ed827062cc781b517fc4f28a6c42899a_cryptolocker

  • Size

    96KB

  • MD5

    ed827062cc781b517fc4f28a6c42899a

  • SHA1

    bbf303b0988e8edef7f19963f7b8217e4ac05b33

  • SHA256

    7a65332ee528114d8d88ab605829283d2bcacc9291fd86cc3fe891d770ad7d99

  • SHA512

    664c59b5d02ab23004f44ea0a1bc13e50641d7de2d8409e465384ff8cb298e42b7827681ab57547d4a9a1fcdb4c5ebc67f6f31d5f8b1f76c60b14a89c7361f23

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bs:zCsanOtEvwDpjBY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_ed827062cc781b517fc4f28a6c42899a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections