General

  • Target

    2024-04-29_2aa3070bf33683b030f58e1122498be4_cryptolocker

  • Size

    55KB

  • MD5

    2aa3070bf33683b030f58e1122498be4

  • SHA1

    4209066f15e27695676450587ffe986328913577

  • SHA256

    1fcb265c417e9481d764793f3df4b559601ced7e20be01d4a0dd4b6da6667d12

  • SHA512

    ef298d1316f108bfc44f88ec3468256c64d987d12a68a3247c2da330e02fc069985844b5f9e552961ad933e5251b40e0be6503a59b532f6306a7e3fcb8b56518

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNd:bP9g/xtCS3Dxx0a

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_2aa3070bf33683b030f58e1122498be4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections