General

  • Target

    2024-04-30_7a3d335e01f2f5d63ca3d1c819b8e839_cryptolocker

  • Size

    50KB

  • MD5

    7a3d335e01f2f5d63ca3d1c819b8e839

  • SHA1

    054bd72fb6f71025fb99795bc68e247c53b03242

  • SHA256

    fd9b379c74dabac0017cc32bdc1e94626a86bdaf378651ef3be4635487ca79ca

  • SHA512

    27031178ddbbb946f1cfd9d02b7088900ea28cdbcd311d54bf575967d5377cb6e83d85dbe355db06802a4a2890ad0008ef3e2a9760bc2ec7df165a10ddb177d0

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvts:bODOw9acifAoc+vs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_7a3d335e01f2f5d63ca3d1c819b8e839_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections