General

  • Target

    2024-04-25_43de01e5663b30effe988d368e1d60cc_cryptolocker

  • Size

    79KB

  • MD5

    43de01e5663b30effe988d368e1d60cc

  • SHA1

    fddc88be57ccf67d424d5fbe19dc12bfba203e14

  • SHA256

    432acd74e2e2d4039c92c64f30f9f8f569f831a1744b4b4c28fabdc314b687e5

  • SHA512

    9a6acbeb36616c45fb7b191d7d084b7a44ab76a36b2852c34c9c42d452ff8bdac6edcaf3c2bf9db44e4d94ade3d609e25f955faa8f6621cd8f7177121fcb50b3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdY:T6a+rdOOtEvwDpjNtq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_43de01e5663b30effe988d368e1d60cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections