General

  • Target

    2024-05-11_b4eaea931cb851be29af7e01a46a4eb9_cryptolocker

  • Size

    55KB

  • MD5

    b4eaea931cb851be29af7e01a46a4eb9

  • SHA1

    d47c63d1112e5d20e6adc18cce2378f72d94c775

  • SHA256

    28cb4773a41c5560ec286b9f8745dbcd6c01dd1182711cd78dbaaab962c01975

  • SHA512

    cf742560120f7e8b8d6963bd0b450f2f23c1453f6c9b0ef90b9f6730c539468c8c846b4d9b6992905b8c9feb9412e290e444e7b6fc5d3e0408b8e45db409485e

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNb:bP9g/xtCS3Dxx0I

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_b4eaea931cb851be29af7e01a46a4eb9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections