General

  • Target

    2024-04-26_4a5b602a264bc3de60889f9c4829ad6d_cryptolocker

  • Size

    55KB

  • MD5

    4a5b602a264bc3de60889f9c4829ad6d

  • SHA1

    7daa2a3edb2f23584e0cbb51c6e58860bbfd6172

  • SHA256

    eea10c2bf5431f073fc3fa42528b95fb32c4fd807f3b51f4f83797b2489004ad

  • SHA512

    a58f6273d08e69a9b8f5c14b03a8aff9d2f8d233af70fcd7b91e618bdc0584cf9388453bfbb3e1f96280ed27e9df30b525e802a7024f9df8302a142e9eda2460

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+p:bP9g/xtCS3Dxx0Jp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-26_4a5b602a264bc3de60889f9c4829ad6d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections