General

  • Target

    2024-05-24_681cac632b682b9664e554d22d6bcb71_cryptolocker

  • Size

    41KB

  • MD5

    681cac632b682b9664e554d22d6bcb71

  • SHA1

    551c759ebfa15bd1d106186b148ee57dc4edb331

  • SHA256

    0a69637f0f02104c2c54f68a618b6501fea55623859a2d888d8deae7ed7c28e9

  • SHA512

    9cadaf31cdcf0cadee2c11a78ca225b51e202aa3885623499d0f16a1fcc4b5722d70b57c49437f86e6570a01984a229c8dc5ca3cfcdd64dbc8823fd965d557ea

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHT:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_681cac632b682b9664e554d22d6bcb71_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections