General

  • Target

    2024-05-31_dd210a62e051f6830e1b1c7208fb0280_cryptolocker

  • Size

    57KB

  • MD5

    dd210a62e051f6830e1b1c7208fb0280

  • SHA1

    a23589730a326203a19371f7c00306e2ed2608cf

  • SHA256

    8dd0c4606e2b3a04b706c03f66fa5b7812c360320749035c107fee386d6c8539

  • SHA512

    34361289230cd0e13c3a3e175dec51e67a351a6c49a22ef669d2c4afd30e2defc4a4bf4aa7ec9faba3e49e08bd4ee7f20f0e404c83f855f77fd687fc1775a8b2

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+C:bP9g/xtCS3Dxx0JC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_dd210a62e051f6830e1b1c7208fb0280_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections