General

  • Target

    2024-04-27_ed06b10774a9082d89a295a058b07c29_cryptolocker

  • Size

    65KB

  • MD5

    ed06b10774a9082d89a295a058b07c29

  • SHA1

    1037da98c7854adaaccf04637a5f1508d0262525

  • SHA256

    52f4fe659712aa8e130c75ad5b5c52c134313ab054f2f909dc81410b71eb6f51

  • SHA512

    5da35778fe2d3bfa123e13295bfe608bb5704c2f5276fbac6f1e1acae38d86d6c73a1d80b1f81c0b3ddb5b506e891f7b64f0fe4bc84b2b3d161d39aff7a312de

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6U5:1nK6a+qdOOtEvwDpjs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_ed06b10774a9082d89a295a058b07c29_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections