General

  • Target

    2024-05-04_3b9b045d39868433ec546137865fa280_cryptolocker

  • Size

    54KB

  • MD5

    3b9b045d39868433ec546137865fa280

  • SHA1

    284b25ec476eb9b7fdfbb956860732f474ee0b68

  • SHA256

    58ef4d0f5ff6d45af77c524a6ef4425e267b32062760d3928fda77237b1a5281

  • SHA512

    8c0ce807eaf916d8ec6ece4f11d5aca85fbd4f4557081bf17c0044817e28ca097a8c8ab3ff34b0934d387a7915aa7474c01cc70adca547ff1b645be6264f37b6

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgULv:bP9g/xtCS3Dxx0a

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_3b9b045d39868433ec546137865fa280_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections