General

  • Target

    2024-05-11_a3914b17a7a07346c447e3018b36f4e2_cryptolocker

  • Size

    51KB

  • MD5

    a3914b17a7a07346c447e3018b36f4e2

  • SHA1

    ac2187b06d8e73dcab43ea2f39c319c038a7eeab

  • SHA256

    d79c340a4d9dee16504b680dff2b22529be49b1bf05616152971a7d59a3e5f36

  • SHA512

    75b2a811b6bf6ee7f1edaae2de6df44486618134782e6021f725453ffd04178ba28aebd716830eed722dbce9f265df2c52ec0b44bc48af3615656bb449aeffe1

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOe:bODOw9acifAoc+vp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_a3914b17a7a07346c447e3018b36f4e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections