General

  • Target

    2024-05-21_4c0e1d80c9c46b73cb165c26f100d364_cryptolocker

  • Size

    57KB

  • MD5

    4c0e1d80c9c46b73cb165c26f100d364

  • SHA1

    22b38e4ccdceb269d385513826f4109b08ed2c8f

  • SHA256

    97435e2a867c1383ceffdee492a07f16280c254fdc48981beb352c08786f94f7

  • SHA512

    afb07ebc16c829b98e4c4f31950a8561351e4d0a10713a8056cd3a5c3975450ede9faf8b1ef195fdd5e4f5ed39811f5ad8a2bc3b05039cdf6a1c8f8e7c0ee4e5

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlbQ9mEt:bP9g/xtCS3Dxx0AQUq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_4c0e1d80c9c46b73cb165c26f100d364_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections