General

  • Target

    2024-04-30_33e4096e2c78c4207c5d2e291e87ffbf_cryptolocker

  • Size

    40KB

  • MD5

    33e4096e2c78c4207c5d2e291e87ffbf

  • SHA1

    5b6fd4657d21ca4034609c82f97f482c50f05f95

  • SHA256

    bdd8225ef101221889320cb5bcc6a980c14e780defda876ee833690d83161e04

  • SHA512

    72ee3dcae5788691cc999972ffbec60b306f1d58dc95f6e10e4bb334e983ce2cd610e9eb01dc8762d0fbdf51f290232b2339130daed7a5f604f4706488a331fb

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHNQv:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKCv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_33e4096e2c78c4207c5d2e291e87ffbf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections