General

  • Target

    2024-05-21_def7bf0c04555369278a3b5b7999669f_cryptolocker

  • Size

    51KB

  • MD5

    def7bf0c04555369278a3b5b7999669f

  • SHA1

    1b79542f00b2636902f7499b66c1d2029f1092ba

  • SHA256

    06b3c20121f829877ec7207de0d264baa89e387c536df9288c711903cd0a961a

  • SHA512

    bb8d338894bfff8dc90d8b918db7f68517e0f7d985b2383b40173a351dacd7deeaf944397ec25590958f46c16ee119db104e315385722dc1cc6270d63d94cf6b

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOf4:bODOw9acifAoc+vE4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_def7bf0c04555369278a3b5b7999669f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections