General

  • Target

    2024-05-15_68d1d796a551bfef7eab0a9411e048ca_cryptolocker

  • Size

    41KB

  • MD5

    68d1d796a551bfef7eab0a9411e048ca

  • SHA1

    02b979597862da6438ec46064d13b2ae70e7fb13

  • SHA256

    5dff2ee6c8d8e829ce00a0a071b1bb0fc26be4d456cf428e397ea646b9e96763

  • SHA512

    8a316647222021cac89d660f3f1bad82baf72a1dda419d2a973c099a8d903a1e9270a50512538308696bb34862aea0ba44561142177685e9c12b95b554e433bb

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHTEo:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_68d1d796a551bfef7eab0a9411e048ca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections