General

  • Target

    2024-05-14_4c2299d55166e5ca2d462a6da37b864b_cryptolocker

  • Size

    41KB

  • MD5

    4c2299d55166e5ca2d462a6da37b864b

  • SHA1

    c019e1883e9cfaad72302e21d4980cf39bde0bbd

  • SHA256

    50ac0e0b75df858b9cab723b044ddb9d0e00ea75494c6d3baa46ff947521f177

  • SHA512

    5afa445da53c854e35675f1e7e0a6ac1360656c56505b3a0b9b04245e1f4a9c45966f0df8dbd29a50f9735c83c2ba2bf5efbf7f080dd0688c37b061089d38530

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKH61:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_4c2299d55166e5ca2d462a6da37b864b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections