General

  • Target

    2024-04-30_d42b1a1b52ca0d24a376898270cec800_cryptolocker

  • Size

    89KB

  • MD5

    d42b1a1b52ca0d24a376898270cec800

  • SHA1

    546213e4d8fe4f48305ec356414a10e244259fc0

  • SHA256

    bbef5cad315a62cef6e47b26c543423289fabf70e2c855b75d53965a4fa807f2

  • SHA512

    bbf6a46634d5f64d87b4b52ad48fdd3ab7af6d57921ccf94ff9678501e47b9fdecc4053683050816f3e2f8b2a8d6203f19b5b7273710faea5c68492a0424ef52

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAs:n6a+1SEOtEvwDpjYYvQd2Ps

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_d42b1a1b52ca0d24a376898270cec800_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections