General

  • Target

    2024-05-10_bd333b77823f163ae2db83fe561a0b34_cryptolocker

  • Size

    55KB

  • MD5

    bd333b77823f163ae2db83fe561a0b34

  • SHA1

    ccaf169ee6e27fd20b0cf1eb63a842886e870c17

  • SHA256

    8ce4c66e849225aadc0028a837f928b97cdfa26a8a9502fc9cabfeab8f1b24eb

  • SHA512

    29f30ed956a28033cfa3ac1eb6c546b8f30233a953dad9553405bc16d48046a666b8174b3d853014c79431d54a357acc9f22ebea56a43c1a43983538864c1c43

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYL:bP9g/xtCS3Dxx0LL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_bd333b77823f163ae2db83fe561a0b34_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections