General

  • Target

    2024-04-30_90eea1bdacf52f11574f3fc5831f4686_cryptolocker

  • Size

    51KB

  • MD5

    90eea1bdacf52f11574f3fc5831f4686

  • SHA1

    d10f1b77ca1dc50e2f08576195cabf6e0e60ad05

  • SHA256

    1879b9ed6f92d691b1c3b66b4f687888c89bf044af09cb5417cc355142558d19

  • SHA512

    f8787287c9478d39e9bb59546052b7a61ec2a57808032a63c031d25d5975303acd681c81ece4277ccfc354d1db345270d8de502598962d47e02d5b2cd0df1890

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOn:bODOw9acifAoc+v8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_90eea1bdacf52f11574f3fc5831f4686_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections