General

  • Target

    2024-04-30_04a5477fa1207793d9c5508df4c369e3_cryptolocker

  • Size

    86KB

  • MD5

    04a5477fa1207793d9c5508df4c369e3

  • SHA1

    fae7881427148160714131a9c11cc5de3a3b92bc

  • SHA256

    711f6aad36c59c2c0834e5473f151ce6bad6f4d35e199a283645af436c65d322

  • SHA512

    69e9a22c56eec85d179580b9b53cddc3380b2492da38969f2beb10295ace90f04198e4822c3dc5b2e0d9ed5063b4b7a1cb46b4437241359f677ca7c0257c7b37

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R3:T6a+rdOOtEvwDpjN+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_04a5477fa1207793d9c5508df4c369e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections