General

  • Target

    2024-05-04_1a13634ce4ae29db1707d945fdeeda20_cryptolocker

  • Size

    54KB

  • MD5

    1a13634ce4ae29db1707d945fdeeda20

  • SHA1

    eaa1b558bef9b5cf8a5581ec1197c41347018565

  • SHA256

    8b1cf62fae4de143e4fb3722f44a5cb8363bc65d48499ec15f98506c4758f2f1

  • SHA512

    a227c09882fcfe3f0f1e0fd2f7ecb023fb70e1ee15e327597d471a95c94249efce2add8d113485493c986643fd5d5b0692f2c2baa4e9e92063bcd5683ee98c6c

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgULF:bP9g/xtCS3Dxx0c

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_1a13634ce4ae29db1707d945fdeeda20_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections