General

  • Target

    2024-04-25_0b1b8ac67d3802bb9963d60ea379e829_cryptolocker

  • Size

    40KB

  • MD5

    0b1b8ac67d3802bb9963d60ea379e829

  • SHA1

    f5d2e3a5490fe94d3a2639d252555475f8e4e23e

  • SHA256

    96cf4472510c53856caa6c8608f2e7d4b117981b45ceeda709f81f2dd17d1006

  • SHA512

    9fedc6e1a53baf1ca932db798efd07cb080eadd0c4739760473891abd4d23dd700bd5fd1e508ae1c79eea20800e3e23f8dc30eed314c4b5155fa49e6de7b1ef6

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKH5:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_0b1b8ac67d3802bb9963d60ea379e829_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections