General

  • Target

    2024-04-30_847c1b714baba54b6a342692d7f8fbfe_cryptolocker

  • Size

    51KB

  • MD5

    847c1b714baba54b6a342692d7f8fbfe

  • SHA1

    624439d9ba8ca1cfdb6dd57fe1096dd3714c5c55

  • SHA256

    c4a145ee05cb484bf19dd8d0b67978be7133a3d6405fe55e7e7cd4639f7d5064

  • SHA512

    a0c75b81e6d7057ebc567491d63908401860d0378ee26adc1978f7ce325bbe93041ba5abfe9f46c3fa8159daad7e000575ce44aa392a39c31f42b94a9b1eb64f

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOZ:bODOw9acifAoc+v+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_847c1b714baba54b6a342692d7f8fbfe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections