General

  • Target

    2024-04-30_bf44bac5e791dda64657c31c8e1aeaeb_cryptolocker

  • Size

    40KB

  • MD5

    bf44bac5e791dda64657c31c8e1aeaeb

  • SHA1

    5f5d66df8e5345d460a629c37efa4364e57279f1

  • SHA256

    237f9b549ca829e5736a47e32af7b7db9c1324651a079c1ae31d86b0a65d99fd

  • SHA512

    047ae68b6254547ba7c11a036704345b1fa16aaf1ee50e088de6736a693b4bafec7566098c339d9c0b6c8142e33e3e22200f208761344edd54440729a8aa695d

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHNQB:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKCB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_bf44bac5e791dda64657c31c8e1aeaeb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections