General

  • Target

    2024-05-20_bc86b261a23843fe4d7034daa74f7137_cryptolocker

  • Size

    57KB

  • MD5

    bc86b261a23843fe4d7034daa74f7137

  • SHA1

    5344d34b68bee66c55a94e73243841534d8836b5

  • SHA256

    2911bacf0110a3554def2f70d187da270979e7df31b3a21ade539cf977c96c26

  • SHA512

    2bb171ee686d5f0c1a3e535a4a459b5417aa3a460ec33603ec8e5c9143dbf57aaec65e12c40f8702cd78d2e89d4fca6e1809ac4a7ce6f40cd219d061fc7ac181

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+UR:bP9g/xtCS3Dxx0JG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_bc86b261a23843fe4d7034daa74f7137_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections