General

  • Target

    2024-05-04_4ca46e807c8756ccbc9a99630219f07c_cryptolocker

  • Size

    75KB

  • MD5

    4ca46e807c8756ccbc9a99630219f07c

  • SHA1

    429994d0724aa67725ec67f29d54d87aaae743dd

  • SHA256

    c27a718466d953e7547f4f804524a8c3716aba00525d8d43138ac5cfd61ee2da

  • SHA512

    3e7529e2ce06676ef385802403f701745b06018c3093db384cf7c3b3253e5515c4be4f04816a39ed2813008fc380194431eb911e57348d6665653e941f87ee9c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFy:1nK6a+qdOOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_4ca46e807c8756ccbc9a99630219f07c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections