General

  • Target

    2024-06-07_c40ec85cf68918620fdd2372b0ccf90d_cryptolocker

  • Size

    53KB

  • MD5

    c40ec85cf68918620fdd2372b0ccf90d

  • SHA1

    04795b0ce2599a9ed0ac1f27c592a6ef0aef1901

  • SHA256

    7abe9a771e2218967236fcafee8974a5ba3d16c87ece8161135a5f693a54c6bc

  • SHA512

    af3e36e266abc3ab252ac8d5a4d5a8ac8ce28915cabcbd0ed82e50cc7f78754f1817a61eab03fb9af4436aa7fe5f3bd7256b3153840012434b1349f171405a9f

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOX5:bODOw9acifAoc+vu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-07_c40ec85cf68918620fdd2372b0ccf90d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections