General

  • Target

    2024-04-30_f321e445da0f1456b1b78ff877b21fbb_cryptolocker

  • Size

    51KB

  • MD5

    f321e445da0f1456b1b78ff877b21fbb

  • SHA1

    da72df810f4692d04412db58f754f161e4b01df4

  • SHA256

    7bc2d425071069a264d84363c5428203a66db9d163aa08052ee7571eccde63eb

  • SHA512

    3258e97293cd9b320d151591918571f6a337046daa1505e8aa49220e006cdb30cad0d2dc33b23277c7413d9d512a1ba6795b0aa26ebf6f5b8757c181995175d0

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtj:bODOw9acifAoc+vj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_f321e445da0f1456b1b78ff877b21fbb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections