General

  • Target

    2024-05-20_d938567d7c8e09ae626a09c844be4b36_cryptolocker

  • Size

    41KB

  • MD5

    d938567d7c8e09ae626a09c844be4b36

  • SHA1

    5a11914397b395a367ca6a4501dd6965771b1c9c

  • SHA256

    699196244a982c04bdffc6498c2bc5d5c376c8cae6e687e7091333d3c3eb4b7a

  • SHA512

    d44ec167bee29f3ba21e39fe1f6f80685307fc0b8381ea914b1fd4a18fac13cd607cca4e80990d8adf729037025efb078de77df09b4a3635df7eb582aaea7ff3

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHvd:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_d938567d7c8e09ae626a09c844be4b36_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections