General

  • Target

    2024-04-24_b32c0dfcefed3a6a6fb6b7b6dd2cf112_cryptolocker

  • Size

    40KB

  • MD5

    b32c0dfcefed3a6a6fb6b7b6dd2cf112

  • SHA1

    a0446791cf7f84cd8256c008ad2c9117cd72bb61

  • SHA256

    53a812d37f9a94ff825738f2f1f8d7633eb55dcda5e9a5c6ea4353cd8e0d840d

  • SHA512

    33ba3b1aa64d612263b2c2359c8df2b21463b121c9a72b5ee7c9bb5d3e3df57b318969ca40f2929fb0db76547b647b41850378e486ffc701906355c0325bce88

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKH0:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_b32c0dfcefed3a6a6fb6b7b6dd2cf112_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections