General

  • Target

    2024-04-23_2a3f1d61427bf60faebb51c20d06726f_cryptolocker

  • Size

    40KB

  • MD5

    2a3f1d61427bf60faebb51c20d06726f

  • SHA1

    818ce0c75bb925c8b442d72a475a162b0fde1740

  • SHA256

    5ca9ad6d59b1d358c582eec2b49fedab162ced4445fcc6c0a4275ddba6697370

  • SHA512

    4beb807e918eb60958722122c35f499fd0abd5d58c5b6261ecbea56aa2a7fa51cfeaee0be226859925fb8ad9652e0baea038ceda3d5e1c62c272bb9b0d941252

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHo:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_2a3f1d61427bf60faebb51c20d06726f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections