General

  • Target

    2024-05-12_29bbff13ec4cee8bddb29b2f9aab4c54_cryptolocker

  • Size

    56KB

  • MD5

    29bbff13ec4cee8bddb29b2f9aab4c54

  • SHA1

    077829a761597a9fc180e6b0aeaf32d1ea0a1d58

  • SHA256

    679b4ebc1b97813811c833b8b2b616546de0a2702c863a521ee67cecb3ed3456

  • SHA512

    82febbcb64e642ace3cb37588a99d91bccdf162e66d658fff19d07dfba05a01686e9253bcf1ff02f17e9b985ed89ace1e489f1ed8ec972bae928826341df7bc7

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+y:bP9g/xtCS3Dxx0Jy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_29bbff13ec4cee8bddb29b2f9aab4c54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections