General

  • Target

    2024-05-01_738fcd5d143f334ce2967f1e122e523a_cryptolocker

  • Size

    40KB

  • MD5

    738fcd5d143f334ce2967f1e122e523a

  • SHA1

    c7adbe441ac546146376e738766fc79093bbad8b

  • SHA256

    07238f689d96bb5d795e291dffc146de988fc8d74540653ff6b1315e2e5ab7fd

  • SHA512

    485caef1009cc38bacf72354ff5e3ae90cc4f115c992ce54480c45de89e7491678514c8152ee1ca36f6dd2f2860c776b1c9d99c1553eb41ba176289a3fee33b2

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHe:ba74zYcgT/EkdCQgpwXFXSqQXfj0xK+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_738fcd5d143f334ce2967f1e122e523a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections