General

  • Target

    2024-04-30_7a4652a22e59b3aee938a04c923507e6_cryptolocker

  • Size

    89KB

  • MD5

    7a4652a22e59b3aee938a04c923507e6

  • SHA1

    70f43be82b66b31c78bb80c5ab13b658b702a21f

  • SHA256

    46445ae706afb3e2cf65684cabd04980b3b0114f7d75dee7c6671e585b0f9b59

  • SHA512

    68f8da190f52afdece922eab35e97ef91ae9743a266e2748b281b612de70dcf89eab3a38805bff8c8c3e9985f604f845dab979dc852e22f66b54d8aed88290b9

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAeP:n6a+1SEOtEvwDpjYYvQd2PU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_7a4652a22e59b3aee938a04c923507e6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections