General

  • Target

    2024-05-29_0f9e8f9bcbb232f7b29c6a31345d8386_cryptolocker

  • Size

    53KB

  • MD5

    0f9e8f9bcbb232f7b29c6a31345d8386

  • SHA1

    544fa0ce11eceaa20f40257412c047d5a3093c28

  • SHA256

    e2b0a23a2da290d940d57d2d8c93c5903b2471519c89bd6cb08c3c09bfeef3e8

  • SHA512

    3e5c1bb8747cf792787580eac9870e31bdb7fc61b9637417dbc2343ae32917500a3243bf5f9f4f6b91129150104b343e2d1f9e8cd866191542c3ae6fc6e0ab14

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXP:bODOw9acifAoc+vc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_0f9e8f9bcbb232f7b29c6a31345d8386_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections