General

  • Target

    2024-04-29_b4e92d0b8258eec13f94749f6531fb37_cryptolocker

  • Size

    77KB

  • MD5

    b4e92d0b8258eec13f94749f6531fb37

  • SHA1

    92210b79df4396491195d6e606f7053f76cf20c0

  • SHA256

    f1ccaa076ccf803cc5e8e3161511a3ff36c37306fe9c94df42ff00e03903b8ec

  • SHA512

    e30364ef12388720af975506825ebfb8d6b841b47b29b4bf257409d20f6fe981466f45eb28e310f936fb9fba5ce88f319e057b13ec0c24f393a491f429999836

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRjx:T6a+rdOOtEvwDpjNt4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_b4e92d0b8258eec13f94749f6531fb37_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections