General

  • Target

    2024-05-30_d6ca911ef0a089e5ba29395bede378ed_cryptolocker

  • Size

    57KB

  • MD5

    d6ca911ef0a089e5ba29395bede378ed

  • SHA1

    7ee7890ca240be9e47ccb8d732a10c60b4eea151

  • SHA256

    a884662382b5a145875aa29275fcc630cb65c59d753f99cff049e35489f7cd7d

  • SHA512

    3bef186d6382a7ef49d5899723607acd5a2c362ddd2bb50162b60f5c1a77c2678dab473a3eede7b19f2e05a58787afc75993e3f06a600ade064381aab265ea1b

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlbQ9mEV:bP9g/xtCS3Dxx0AQUi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_d6ca911ef0a089e5ba29395bede378ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections