General

  • Target

    2024-04-28_67a530f449f875d65efb2e91638098e2_cryptolocker

  • Size

    65KB

  • MD5

    67a530f449f875d65efb2e91638098e2

  • SHA1

    d112cf3305de23f60dc817f18484de18909b7135

  • SHA256

    814b34fc1165873b6724d52811e6d544a2217a570ba699d4544eff912c40b84f

  • SHA512

    a75f2547ca3200e7e95bacc88f1c733590b7ce6bb749616b1dd3b0f5eaa80f2a0e6c7d96305c4c585fcfca880022c8edd7567e92a3225fdd28d56d369269178a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyZ:1nK6a+qdOOtEvwDpjW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_67a530f449f875d65efb2e91638098e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections