General

  • Target

    2024-04-29_d7562fbaa265f2d52859d42ec568395b_cryptolocker

  • Size

    55KB

  • MD5

    d7562fbaa265f2d52859d42ec568395b

  • SHA1

    ed108fc69d99c6f1480395de6ce03aa387f7103a

  • SHA256

    d680a1e4db93a8ec282c77d241823161e765eaac6d5b1169cd2bdb39bfc5ad09

  • SHA512

    3c1242dbf087a38886abb9f6755542f001b49753eed92fbeda5b26aeb714cc58392ef664a213c6ddabf21f6b77711f0de9ebfe9536896f77cddad8463df5e68d

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgza:bP9g/xtCS3Dxx0na

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_d7562fbaa265f2d52859d42ec568395b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections