General

  • Target

    2024-04-28_49a855c01e7d817b056e18f5a9d191f2_cryptolocker

  • Size

    80KB

  • MD5

    49a855c01e7d817b056e18f5a9d191f2

  • SHA1

    1ed17741bda602c4bef6347232d94e07d38384b3

  • SHA256

    38b5d76a1f3411ef01c8eefe30acbcafc46c9fc23cef87858035e77de87163f6

  • SHA512

    dad420191beef682435ecea11f60b1a0914d7f6bf162d75fbd4491687bf638d7ac5b25aed354d2af6ac0c1042c959765e88aa6d9552c1c43c3aac55168900407

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdb:T6a+rdOOtEvwDpjNtt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_49a855c01e7d817b056e18f5a9d191f2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections