General

  • Target

    2024-04-26_4bc9b88d673779eef1daea0ae4338502_cryptolocker

  • Size

    89KB

  • MD5

    4bc9b88d673779eef1daea0ae4338502

  • SHA1

    cafb6712efa6e2460d2147cfa7d4b916f6479a5d

  • SHA256

    04d6e504fac8d2c8fcaa7d5d260226d8437513b7f422f07ec949377bbd86e091

  • SHA512

    3e80c37c993167cdd0b381a93e3f17dd3bffc755690c6f61345d11dec5893c139ce2d035bc11a22fc64f069b9e27945bd9fef3bb7606918009d22b8a14fa96fc

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAe:n6a+1SEOtEvwDpjYYvQd2Pe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-26_4bc9b88d673779eef1daea0ae4338502_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections