General

  • Target

    2024-05-16_be80b23dc7c0a13df2c017d86d725aed_cryptolocker

  • Size

    41KB

  • MD5

    be80b23dc7c0a13df2c017d86d725aed

  • SHA1

    38c328692f81ea4a3722826067a04eec41667180

  • SHA256

    47c83ab3440ef7e5aab13ecd7bd9b1e3e92b0415ffd11d811dcaa9f5f93a3910

  • SHA512

    6e0f571cea32d14f0da070bf68f818f4d079499a1309b2f762ed79d7635292c2d9b072f60e4710ae4866e877f86ae5c2c9731bd19e6e38b02f00714a7e08ccf7

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHE7:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_be80b23dc7c0a13df2c017d86d725aed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections