General

  • Target

    2024-05-21_4f26203729e8b75dcb7fa88269997e52_cryptolocker

  • Size

    60KB

  • MD5

    4f26203729e8b75dcb7fa88269997e52

  • SHA1

    9802af3e4ab140739481f241ca6a881cccc27d2e

  • SHA256

    ce68b6e12521e3fdb126cba388e98b3ebeda44b4751339e57fb2a9a532af21aa

  • SHA512

    3084699a47f05f37d3b0d77da48aa181c0ee7aee70f163d54d19c78749f5b472873d003f4cad5b58e6c2fb804eeafb77d358e75924aa78b9dafa0b2c856e72ce

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3I:z6a+CdOOtEvwDpjQz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_4f26203729e8b75dcb7fa88269997e52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections