General

  • Target

    2024-05-28_a16b0ff2a6ee8b0c1a37a7d39b3430b8_cryptolocker

  • Size

    56KB

  • MD5

    a16b0ff2a6ee8b0c1a37a7d39b3430b8

  • SHA1

    3eea8a7a4c51f15975b26f7e0f7d519e91f9fa27

  • SHA256

    3b91a473d001b56bcc8204b3828ad5e04987a9012fcab35c96d3925073492020

  • SHA512

    34e4cb0c936d1a061f61da6e80cc543a5a933db9412c348af0697a6bf9aa8805f2de53120f43ecfd1aa07bb5798da1f0ad0170ce9bd8c2b6665784f3a4c3916a

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNJb:bP9g/xtCS3Dxx0C

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-28_a16b0ff2a6ee8b0c1a37a7d39b3430b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections