General

  • Target

    2024-05-13_92dd1841638f0c870c32b658bc0c6adc_cryptolocker

  • Size

    41KB

  • MD5

    92dd1841638f0c870c32b658bc0c6adc

  • SHA1

    98a5920b350d6a2b2faabe5ca25eb486b218f3cd

  • SHA256

    5a239eab1e50c9251471e472353dc94980461fbcef709e60597aebfabbfc9a45

  • SHA512

    72a2d58896fca2236e6f4c6f6121394a6b6574e003de9a149a93eb19c0eb2ba14fe81ccdaecd82ef6bb13235d2058eb5fdc43d59c34f5e1ab7d96d75a8670356

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHp:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_92dd1841638f0c870c32b658bc0c6adc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections