General

  • Target

    2024-06-01_a6d39f1608cd368dbc792c7c81645363_cryptolocker

  • Size

    57KB

  • MD5

    a6d39f1608cd368dbc792c7c81645363

  • SHA1

    b4f48e14d27fb3a1acdcf6019c2aa34f30ecb290

  • SHA256

    beee5d747349e1bf5c4e004d0b32ac5538d9bfa8b1e8d82f27a205d4cf49815a

  • SHA512

    e39bd059d09c30e15c1c40e85218a006668d8e2bfda64b47298dadd5dd4c4b53af3e27c3d036f4554d4989daba8bbd2733ca465e0b44bacd247104642b7594cd

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzCA:bP9g/xtCS3Dxx0nCA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_a6d39f1608cd368dbc792c7c81645363_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections