General

  • Target

    2024-06-02_ed0e500777a9c27f51a4d9607dc82561_cryptolocker

  • Size

    41KB

  • MD5

    ed0e500777a9c27f51a4d9607dc82561

  • SHA1

    dc51a076c827b73b1997ebdad2b5714f471b9f53

  • SHA256

    68a17e10d44d1e34e4fa5fd29160793cfe28035b7f2c8119e09f0f902c57870f

  • SHA512

    290144fc7f497c64ff157076160c19463b737b7026ff2e5244aac38bb620f22a9d7738a60631b21393b834cfc44dd90195888bf38134a200dca7797e5e5a85eb

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKH6T:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKaT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_ed0e500777a9c27f51a4d9607dc82561_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections