General

  • Target

    2024-04-28_edb3673f65313c60caa9b65e6a48bc4f_cryptolocker

  • Size

    89KB

  • MD5

    edb3673f65313c60caa9b65e6a48bc4f

  • SHA1

    8745a04e050309f1b991785c54afc311e3c8f1f4

  • SHA256

    fa51d767e13260e69f3c936c98e664682d8546bd56d41b60c792393cb8c1587a

  • SHA512

    556f6c2bcfb25ebbb376c408b992a47fdaa8ca28f00a50da1ef3c93dc87abd329ab8e4d92f250ed8978b04c6baa7d1441380fe6a7cd5ec3c016e3887c3493a88

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAp:H6a+uSEOtEvwDpjrYvQd2Pp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_edb3673f65313c60caa9b65e6a48bc4f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections