General

  • Target

    2024-06-02_1b912a9a953de665942bf4b0e3f7a9b4_cryptolocker

  • Size

    53KB

  • MD5

    1b912a9a953de665942bf4b0e3f7a9b4

  • SHA1

    fca90f8be6a44990fee6b945952a481e6e9ba7c9

  • SHA256

    237be530fd70d7df06deef9bd001f24e8ea4b4296ba895948a96c111e235221c

  • SHA512

    f815de661c0abaec164c54fd3d6c300359d5c7e70859a8d8ff9108b0a42eca016973d02f1e8f002daf95e4ea801b096605920e69a0c5f6e4f5c22ede80724496

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXFVE:bODOw9acifAoc+vn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_1b912a9a953de665942bf4b0e3f7a9b4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections