General

  • Target

    2024-04-30_4ac4c65b5d7c7b99b3ede3b082014cc4_cryptolocker

  • Size

    65KB

  • MD5

    4ac4c65b5d7c7b99b3ede3b082014cc4

  • SHA1

    1a52ae13466d22d44cc7c3c60afc3613ce46d705

  • SHA256

    ce88473130ad1bdc6e157441f9b101ef954206c303d7f282e592b8a3350e8e53

  • SHA512

    372fd21c89913909a73b614530c3432bd0555e314c29f3418538fc42def5c935a9363d41168e0b71974e5b1ef64357479c320c8af3c22e41b8b2932e660f890b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyw:1nK6a+qdOOtEvwDpjL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4ac4c65b5d7c7b99b3ede3b082014cc4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections