General

  • Target

    2024-04-29_737f34bab29cf418ef2ca38016fd52c9_cryptolocker

  • Size

    89KB

  • MD5

    737f34bab29cf418ef2ca38016fd52c9

  • SHA1

    24cc05633c0d860e55e5c60036202e6c363c7141

  • SHA256

    b15a0f4aa8e28053a68d33ed1353620099403c465abad4ff2b77ccbe77e33102

  • SHA512

    83a51c219de11d7b0bc02d09a01e6abd95551b59ec8caa7c12359f7f7f07bc4315be3197a48941ba4ed7bcff6427425b2bb017c40d1443f32fcde84b7b087c7e

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAg:n6a+1SEOtEvwDpjYYvQd2PH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_737f34bab29cf418ef2ca38016fd52c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections