General

  • Target

    2024-05-11_be2b720323c29531a2de9f2729c15fdd_cryptolocker

  • Size

    56KB

  • MD5

    be2b720323c29531a2de9f2729c15fdd

  • SHA1

    11ee51b1e15a49e3955ea4d923e397bb419ce9ed

  • SHA256

    a40790fd55d19f8d5eb79bd2cd33538082c6ffce39953c468aa6c6549d4ca850

  • SHA512

    5d52797b7768e9bdda862dfbee6f7c655a4587bd02a94ef054be525009bd46ed7167f86cf23ee494ab115e7a2486f2b053e99b638fb9b141130cf3755d5c618f

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzP:bP9g/xtCS3Dxx0nP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_be2b720323c29531a2de9f2729c15fdd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections