General

  • Target

    2024-04-28_90c646e06dfd21f4deb72d1e5a58b384_cryptolocker

  • Size

    82KB

  • MD5

    90c646e06dfd21f4deb72d1e5a58b384

  • SHA1

    e45de0cc4bbe01d97b65cf7c213e4190a356220a

  • SHA256

    2e6af23836fd27b32b2fca4a76bc03cce19019e0b2496beb20f09291f653a3b1

  • SHA512

    ba18640f62beb14393b7798a8b7ed5265aeffcd79d0e1335e6f5256c1ff1fa272f3ce155b20c695d9feb933d70ae5c186084b4f8de969c13b9ff3a41e428dc44

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Q:T6a+rdOOtEvwDpjNc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_90c646e06dfd21f4deb72d1e5a58b384_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections