General

  • Target

    2024-04-29_64d94186721b880c43b828d1b08b54d9_cryptolocker

  • Size

    40KB

  • MD5

    64d94186721b880c43b828d1b08b54d9

  • SHA1

    e67d1f5dbd85572ddab2aa88b2bb1d02292dcf56

  • SHA256

    af8bb1c71adc06975da1204fa6e73fcac2dcf0381b6bd62fe65832ba2568adae

  • SHA512

    ee4dcbd9db40d8ea60451a9a36944633f0d8f9f2ced66eb23c49dc6b65f4ed2d1a4ac71a62fb5b47b48866f73baabe2ba677bffbd9fd31cefe78e1da00133dc3

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHn:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_64d94186721b880c43b828d1b08b54d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections