General

  • Target

    2024-04-28_7649d1c24ec50af72e71d5ac0e78e345_cryptolocker

  • Size

    80KB

  • MD5

    7649d1c24ec50af72e71d5ac0e78e345

  • SHA1

    12e6f13c452be78b6411aade413468ef6c9c64f2

  • SHA256

    9ee5bb7d9f30f9ffd028fa2a9be41ec25d97a68541c055a77597073cffe5edb5

  • SHA512

    35b257eaeeabed827b906ac346ad88d99ca4d5a6f374274c7ad75d658953cd11da6147e330dd88f3805c40af0b050669c76ed172c059c557d23a15a7c41b4b95

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBde:T6a+rdOOtEvwDpjNtE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_7649d1c24ec50af72e71d5ac0e78e345_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections