General

  • Target

    2024-04-30_4d35c78f10c9c2502ee175974b10a722_cryptolocker

  • Size

    83KB

  • MD5

    4d35c78f10c9c2502ee175974b10a722

  • SHA1

    8c9708aa1d84b2f4ffd8f43d83fca76c961915d5

  • SHA256

    53dea11facead040a44ad0f5c0fde80d20a67dd321f87ae72bf769b280a54cd5

  • SHA512

    b0798fd0fd375a63ab803f7996596a05938716df8d1091ae9f5e39a84e8e468e3facd22fe4683ec0af52b4d7e754c5388fa27ee92db9c4edbb02603f3e23762f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1z:zCsanOtEvwDpjJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4d35c78f10c9c2502ee175974b10a722_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections