General

  • Target

    2024-05-10_4ae041fc70d268414f0f3bf0bd7c826f_cryptolocker

  • Size

    55KB

  • MD5

    4ae041fc70d268414f0f3bf0bd7c826f

  • SHA1

    1d08a161f0a98b8752c6f13ae3b01fe360ed9784

  • SHA256

    ecf9d008dc8145888632f74c5ff03ab0d55587ffbbac46dd35099249762619f8

  • SHA512

    11de2b3158c096227e0aa9ccf3de44988963635df58cb52acb367473a70bbd375f0bd6cb5bb881a5934af48f00022945df8026dc450d7f8737e544f5194214dd

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYq:bP9g/xtCS3Dxx0Lq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_4ae041fc70d268414f0f3bf0bd7c826f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections