General

  • Target

    2024-04-27_356e0a381479e4b8e7e6e94f3c1bd502_cryptolocker

  • Size

    76KB

  • MD5

    356e0a381479e4b8e7e6e94f3c1bd502

  • SHA1

    a41dfc2fe60356153fa54bf9456c6493e2423b65

  • SHA256

    507e952b9bae1e957f6ff79a4059587d873ccbc2426f9b052bba6175290d20a8

  • SHA512

    924dbce430f927405ea80547939ad288f08d2fa6108704bb32fc646e391973e055ed822e3f5979efc9f2b28c49e7caccb8fc66a298d8fb2db60bcceceea67cae

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxF:T6a+rdOOtEvwDpjNtHP2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_356e0a381479e4b8e7e6e94f3c1bd502_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections