General

  • Target

    2024-05-31_9afc3bd7af72c151fb81c7af5a17424e_cryptolocker

  • Size

    51KB

  • MD5

    9afc3bd7af72c151fb81c7af5a17424e

  • SHA1

    810c2f270e799e6e0dff0f007fcee2b95714cb79

  • SHA256

    bca8282e85bc76a596a50e06e08f39d831892250e94a121d22eb9f228dddec22

  • SHA512

    8a8c4d06ad91fbc4ed3039a30bf85c78b674b95f9c6b0c3ee40eda9df4d82a5d78e8e50ca1f0010f09a7d6df52e19ad617da381c4f6e38fb5f6a036a73cdcd99

  • SSDEEP

    768:buDOw9UiaoWUB2preAr+OfjRW00S16avdrQFiLjJvtXm:buDOw9aWifVgoc+vXm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_9afc3bd7af72c151fb81c7af5a17424e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections