General

  • Target

    2024-04-25_732b814f83ec125705f09b2b55a351b8_cryptolocker

  • Size

    50KB

  • MD5

    732b814f83ec125705f09b2b55a351b8

  • SHA1

    7d5b041f86d83f16a8360f5d2b2f29c10cb2a036

  • SHA256

    123e92ae717a304cb9c50ae3ce18f583a932c4a399e6c64df8e70e50675d43ee

  • SHA512

    a93dee3cd37512cb7c5597a82efc23c6d3952f16fcbd5d8c7b66b38bc77fde064e3b326a6523bd3b6d581c427c8fe222b10374870bf1b17f61c99524b0bf0ccb

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtT:bODOw9acifAoc+vT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_732b814f83ec125705f09b2b55a351b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections