General

  • Target

    2024-05-01_6bf5392fbed5df0fd3de758fc3e52f44_cryptolocker

  • Size

    41KB

  • MD5

    6bf5392fbed5df0fd3de758fc3e52f44

  • SHA1

    d0ef9f0ac4c14655bda7a8444938a85f3073d8a4

  • SHA256

    a1aef9b50f9c554496e7141ff12e7abfee1c285e41cba4be80c003e96a4401e3

  • SHA512

    2383738193eb32c42b88febc27b3739448734f73e3ec08e1f0035cc79bb77ef93312c09520d5c7292503e3ac79df6262cd85637fcfe5741cfae60bbddfa0b9ec

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHNQu:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKCu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_6bf5392fbed5df0fd3de758fc3e52f44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections