General

  • Target

    2024-04-29_dfab0ef6dc2d8e3e32be56114eeb1b3b_cryptolocker

  • Size

    55KB

  • MD5

    dfab0ef6dc2d8e3e32be56114eeb1b3b

  • SHA1

    84430220d1c145eeeaec9ac22e9ea0711240449e

  • SHA256

    7daa4b9a9682fe70319c92607e557823ed6b04e074803e1b7bfc5a28ce04f552

  • SHA512

    3a7af2bf5b41c90e0db391df6e4388664031e812a3990a522627b8997f9b703212da619af632cd3fc0841e1d4875051f31f640c9b477c54727fc72c846854aa0

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNh:bP9g/xtCS3Dxx0W

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_dfab0ef6dc2d8e3e32be56114eeb1b3b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections