General

  • Target

    2024-04-29_de0fd5e112493781464ce163d3970e78_cryptolocker

  • Size

    55KB

  • MD5

    de0fd5e112493781464ce163d3970e78

  • SHA1

    32ff9e3c5f27375dadd5f41c8dc58366e2b4e729

  • SHA256

    4f03e5f813cd553563ae2f192c05f2a7884bee0eb72e93d1f864d349d3a18668

  • SHA512

    377665cf5219ce2f2ac4432873299d9e078f3100aba8e1fcf4ae567d1e71b0641bad302a9e574a2978ac70183f2e21582b399e40bf2b79159bd93ad95226f034

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNr:bP9g/xtCS3Dxx0I

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_de0fd5e112493781464ce163d3970e78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections