General

  • Target

    2024-05-29_354c243425911c4e60e8dab3b689e4fd_cryptolocker

  • Size

    52KB

  • MD5

    354c243425911c4e60e8dab3b689e4fd

  • SHA1

    1ee15256b8d1a46ae49d1e919495f2755e53bf53

  • SHA256

    62ab9d611501e9ef1fa2eac4c7084b63b66b1c4b94e3f12e9070230b5adf7472

  • SHA512

    4ae88990b7ada42d053a80c6fbd15dcf10478f48c694f9482038b0cc3aaf9bd36d4c2ab5d3ab666dc4bc90188a5a203da5e04e2e39055d81c6dd45b149b26176

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOt:bODOw9acifAoc+v6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_354c243425911c4e60e8dab3b689e4fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections