General

  • Target

    2024-06-01_9e137231fbd0e33cc83c5e9e8171088f_cryptolocker

  • Size

    52KB

  • MD5

    9e137231fbd0e33cc83c5e9e8171088f

  • SHA1

    7e68cfcc1f2cba3e4f77f16120ee0ff11a8b428b

  • SHA256

    94f7ff897d8d08ca32b166f2d76aba0c58fd89d2529a92ee6edd62fd59472c01

  • SHA512

    d8b976d190d77c4b9b30d6d3f4f655bf6a8cf028c4550f0756d272074937e0ab67446370c18b55a8ba4b26aa6c4daa1f0139e1bcd0b1343477c7e5549cfe03d1

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOx:bODOw9acifAoc+v2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_9e137231fbd0e33cc83c5e9e8171088f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections