General

  • Target

    2024-04-29_a7ad02a54413e545a5985221306a069c_cryptolocker

  • Size

    65KB

  • MD5

    a7ad02a54413e545a5985221306a069c

  • SHA1

    45184d19637fe375fa1ee1eae27706aa8e4b7fd9

  • SHA256

    d93132add8dcfc89c76f230ca3984f285d55817ee350971c123798bfda718f60

  • SHA512

    e705874ed74edbed9415b4ef3016910da5e80d80ce38f570e7fb80c9132c9d27b427be74eeb2a94ca2c7c9d1e8d6e6c4ab16096430d66601dc6b5d0b114c9275

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8x+:1nK6a+qdOOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_a7ad02a54413e545a5985221306a069c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections