General

  • Target

    2024-06-02_223fcafadd5d1cd83771a1d2a5d14fd7_cryptolocker

  • Size

    57KB

  • MD5

    223fcafadd5d1cd83771a1d2a5d14fd7

  • SHA1

    7364a9dbc365801a6d3fb7aaf82e832111c7672c

  • SHA256

    2ef4c19715b8da6b3860a8630a25e6361959ddd7cf09cb83a7574d4b8189a4ae

  • SHA512

    681d07cdf3ff21b9cc5a9b522370e6ea1923ccb59093e59c9373138abbc3c2daf5432392accf47a03b3ca78b0de607572366163243bd80cc3ed070b3afd3a3c3

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl6:bP9g/xtCS3Dxx01

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_223fcafadd5d1cd83771a1d2a5d14fd7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections