General

  • Target

    2024-04-30_c1e86134074f18a7d884faf50353f9b1_cryptolocker

  • Size

    55KB

  • MD5

    c1e86134074f18a7d884faf50353f9b1

  • SHA1

    99fc5cae88fa1670f71e7df50f8e4059b0aa49b1

  • SHA256

    40cd1c1bddf0e5522bf426792cb10c39942cf97bda9502a7064f9591e05ab17d

  • SHA512

    1b1fc8a6fd2518c30c0a6c5912dbd582212373f01253d984b0e3d3232e532b050e4ec656f96cacf1c90890c16dc57ddbb077cfb614af7df78e6c34f8a89f82a1

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+Sm:bP9g/xtCS3Dxx0JSm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_c1e86134074f18a7d884faf50353f9b1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections