General

  • Target

    2024-04-28_74a9a3f8b059169e4442d4601aaa1553_cryptolocker

  • Size

    65KB

  • MD5

    74a9a3f8b059169e4442d4601aaa1553

  • SHA1

    5b338633656974458bcae307e175ae97213a923b

  • SHA256

    e994c24a33da91fbf2458097a8c80bf7ccc7cc7060dbf0143bfcd97965ac4c2e

  • SHA512

    e8bce41f23a7653c64e9a3aaa8478b5d845584fb24c7ffb4153f997e1ebef5eb7bdf180d7a326979ec59798d05de42cbb86eb2cb2419cecd4a8d92f79cc4e10c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDya:1nK6a+qdOOtEvwDpjN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_74a9a3f8b059169e4442d4601aaa1553_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections