General

  • Target

    2024-06-04_6417ea5500211a161b070fbdc053ccf2_cryptolocker

  • Size

    53KB

  • MD5

    6417ea5500211a161b070fbdc053ccf2

  • SHA1

    2e23ff722508096a73f322c1a15466f5d930c3c8

  • SHA256

    7753f3bb742eb0494d67cfe4061d4a703a4c7213b2261b21288c1f3daeab50b0

  • SHA512

    38eef40a58a7ac3fd1b58a404213f0dc9a0caef206b768888e3caed0cc5eb69b2f6b7a2cd5926e8e265f0a2002a685d9377cb36a7707ba885fbedf992044447f

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOX4:bODOw9acifAoc+vL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_6417ea5500211a161b070fbdc053ccf2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections