General

  • Target

    2024-05-10_df46955e35116dd21973c97f95f26df9_cryptolocker

  • Size

    41KB

  • MD5

    df46955e35116dd21973c97f95f26df9

  • SHA1

    57e099de80ee0575162b3b6fd5b04727da3f5f8e

  • SHA256

    77d73dfdc5b398c42fe010b0dc65167a5886dea8e29353775565dec9ccd730b2

  • SHA512

    59908f8855667e5590ba714afcc06fa8ad56fcfc1046547c87b759d8762acecae7506773a94f448822ab86f5932d905de80987e2a5d76970a2f460959c828d42

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHNQUi:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKCV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_df46955e35116dd21973c97f95f26df9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections