General

  • Target

    2024-04-28_4eb2c0728e739d5010abf028cab3937d_cryptolocker

  • Size

    61KB

  • MD5

    4eb2c0728e739d5010abf028cab3937d

  • SHA1

    c07d544b8f3eec3d785272f34f736ce425d39485

  • SHA256

    7064e6903a889789f2c6a0a653116fdac9e88ec4cda83e844af3f1ebcd5fecbf

  • SHA512

    3ad3636619d6af9eb9743b3239b2297c7d5f7171f8fb9ce209a14adf151db99b8bcd2d8e0a2cfcc403fa053084b3b7affba904b9f191ee56e112686b73011c54

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMhE:1nK6a+qdOOtEvwDpj0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_4eb2c0728e739d5010abf028cab3937d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections