General

  • Target

    2024-04-29_963f5fbb80fde18ae18ec8fa729752f9_cryptolocker

  • Size

    40KB

  • MD5

    963f5fbb80fde18ae18ec8fa729752f9

  • SHA1

    e2b9a8dfc0f8f06a26f566824df4be58f8224889

  • SHA256

    36fa17e65c03f6c046941e8b4521ddd91c63f9d172886b858c6eee4bda830d23

  • SHA512

    7105bdc96ed897015c6890827868709b153da9abd049659fb7b6793eea1e96803f5b973c88e8b3a25c2d7d6213fa61d87d881430967e26263aa10cb94433dac7

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHNQa:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKCa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_963f5fbb80fde18ae18ec8fa729752f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections