General

  • Target

    2024-05-10_9072931dd9e2361faeb22ebe5a56b219_cryptolocker

  • Size

    40KB

  • MD5

    9072931dd9e2361faeb22ebe5a56b219

  • SHA1

    64002f1f4104961360523b4c6b4cd64049173ac7

  • SHA256

    8bb1aed2620d2a1ba4a217be15d0dd3bf23cb7d1d53d2f8f1008439e9e6f9283

  • SHA512

    ba38d1668d9ae8f0819ecff7c6901312fa613eb1ad85e7e140683b9354355af9fddd7622e5822ed20ce15c5f4c945665896ccf69538141881d93ac69da70e40a

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHBYD:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKKD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_9072931dd9e2361faeb22ebe5a56b219_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections