General

  • Target

    2024-04-28_515b4606af4e4aabcdb5fd2ad173c717_cryptolocker

  • Size

    65KB

  • MD5

    515b4606af4e4aabcdb5fd2ad173c717

  • SHA1

    41be84e9a9f51ac2d1698c7dce56bd58be28a263

  • SHA256

    f84247ad665f2318e11aa3b0662477402c1b95835126776da331a968fcf35057

  • SHA512

    8d870a25fb7bd74b9e6d3657e1025bdc0298f6b29b48a3068290bf30b8f7e9b701c3546f7be5009b9f430a17a93e5b4c22b258e9ee5e25f6f6d212287175f3f2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xK:1nK6a+qdOOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_515b4606af4e4aabcdb5fd2ad173c717_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections