General

  • Target

    2024-04-29_db072915cc8fcf4d7a7ac4c2ed321773_cryptolocker

  • Size

    55KB

  • MD5

    db072915cc8fcf4d7a7ac4c2ed321773

  • SHA1

    a14720d630208bd6bba77df197ef5b7e9a70d5c4

  • SHA256

    44541419a15ef22f4a2472af4ef4850a37ab9259c474e8b4577fe09229bd6259

  • SHA512

    fa49529d80d7450763df5259bb919dec2b061737403e4df38318eff0a3d90c18cc74bf46dbb6d049a6278f5075884feaefd6a14d7134faefaeb3292b49ac1157

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl67:bP9g/xtCS3Dxx05

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_db072915cc8fcf4d7a7ac4c2ed321773_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections