General

  • Target

    2024-04-24_3c52c8bf2af024f77962d2b44664e6a2_cryptolocker

  • Size

    50KB

  • MD5

    3c52c8bf2af024f77962d2b44664e6a2

  • SHA1

    2f68a3bb6dd05803afc37d2b122cf5400092ea21

  • SHA256

    fcde01c3b9626611aa39fa21215c1d1b1ffde58e1a3d102e9d40b18f17f0debf

  • SHA512

    e9dbee90266a56f776fc706a23fea4a9fc0e55e2dd11f01ac4d427df8d362281442189cf8fba735a897bfee179e4156df7b6f39f81dd469218f624bef250156c

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO4:bODOw9acifAoc+vr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_3c52c8bf2af024f77962d2b44664e6a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections