General

  • Target

    2024-05-17_4824c1b2ae668578e8a6cd9a0834694f_cryptolocker

  • Size

    56KB

  • MD5

    4824c1b2ae668578e8a6cd9a0834694f

  • SHA1

    87461f381e2eb2c9f58ef1abd9dcd5bf764877be

  • SHA256

    ba227a39d4fdf71b489ef23f676a5e120a3997e77d501d1a661a1c678d7a5fe5

  • SHA512

    9812e441c6a95ab356efc0644960c4f9150c4cd75d85c6d79823bb2471d9ad0c8660730922f0c5bbecd6976565e488cea6582d1bde13e2e0280489adecaf721f

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNJxj:bP9g/xtCS3Dxx0Q

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_4824c1b2ae668578e8a6cd9a0834694f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections