General

  • Target

    2024-06-03_10eb091e4c289bd11728906150ae7b9b_cryptolocker

  • Size

    42KB

  • MD5

    10eb091e4c289bd11728906150ae7b9b

  • SHA1

    340b9fef07097c593483c62c2fc2820c2578946a

  • SHA256

    1b9b6acff421171ade779fcfb1f3d2296640ece6043f60d06bce8a2dc525436b

  • SHA512

    3469b732a6694c767c4a5b48298b2d06f616e52d7cbcd279da8271a005c6940dcd9be95a9be895ceea8c5a373d3b47a9d301fce9b28121f32b6ba5bc44a03506

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHTEXT:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_10eb091e4c289bd11728906150ae7b9b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections