General

  • Target

    2024-06-02_4fbecda22b6288170905bae7308cbb71_cryptolocker

  • Size

    57KB

  • MD5

    4fbecda22b6288170905bae7308cbb71

  • SHA1

    7d898ce4572f8f31d9fb6031f246a9589e42d5ac

  • SHA256

    add7cd96083beee81c4abb5149f705e23d4b9c98f26636285924919c0f10ed3b

  • SHA512

    885f40cda97cfb3cd836c7a9f2db3172ba0d1fc038d7734afec59ad49b69bc0c6271ab45fc146e64715b2090983e0508419e42a9b75ebbac00aefe1ca8c57e40

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzF:bP9g/xtCS3Dxx0nF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_4fbecda22b6288170905bae7308cbb71_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections