General

  • Target

    2024-05-12_306a6c09b038d8952835225dc4e16c29_cryptolocker

  • Size

    51KB

  • MD5

    306a6c09b038d8952835225dc4e16c29

  • SHA1

    2697e384e39cadb9759951bce8efc9187735c0be

  • SHA256

    2328a6488b42018f999c6becdcec295204d0ba284ad3b112cfaa115837bafe6f

  • SHA512

    bf5ae8d961d48d4f40856f436eb644b70dfdd3352bf03be978f1d72738778035433afc536fa75784b5214ee66b4284ef178be1f678f989d8eed3f1830a6cc75d

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOr:bODOw9acifAoc+vY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_306a6c09b038d8952835225dc4e16c29_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections