General

  • Target

    2024-05-12_49d2ae8e6b37799821f04c604111ad03_cryptolocker

  • Size

    66KB

  • MD5

    49d2ae8e6b37799821f04c604111ad03

  • SHA1

    78709081e81723a1fe1b195dd6b41222e1f95f6a

  • SHA256

    5bd302fd9d2bd2ec8035dcfbd6330de0c95009fa9e0e887b66d1640072a70c18

  • SHA512

    73f20d81222808b7e2a86b74ad616c0e79ccfd48e6e5ee259b3569b9af9a26dc16b887716264de5e86e2278a711b4b9a4473a7fc3ba94a7bdb9a3cef5d5725f8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyn0:1nK6a+qdOOtEvwDpj/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_49d2ae8e6b37799821f04c604111ad03_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections