General

  • Target

    2024-04-30_c1517ab3e279a96b05c979ef6e933da4_cryptolocker

  • Size

    55KB

  • MD5

    c1517ab3e279a96b05c979ef6e933da4

  • SHA1

    343f81675c7bd29726ed6e25eb2d1c7f1fc2bf8c

  • SHA256

    9fff190e21212a3ede2f745891bd6bb348206d00fd5b4f37f0d51808f3abde38

  • SHA512

    e29bfc504fc4fd6cf026bfd5f59dd25b38a7e852df13a5c079c58cfeba5b37d1e5dc51197accdfa5de5cfc3ec7254a5973937d84044338feb17f1922064db342

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzP:bP9g/xtCS3Dxx0nP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_c1517ab3e279a96b05c979ef6e933da4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections