General

  • Target

    2024-06-07_937dbf1ecf4dbe9c1218a03cd54634b9_cryptolocker

  • Size

    57KB

  • MD5

    937dbf1ecf4dbe9c1218a03cd54634b9

  • SHA1

    69068ae1bdedfceed9ba44c487ae93b7f6bda536

  • SHA256

    42b67ecca5b60badd0f3d78cb6fe738e5852764a4361d291a0a779ed06c93c34

  • SHA512

    474bf39473331b12f1575bb3fc8d27a7b928e095e1be6abfbf1714d8332a641fc3fc7beca95a3dda0ec696aa096bf46d5150ff0b5ab60c7702a3346731315776

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcM:bP9g/xtCS3Dxx0h

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-07_937dbf1ecf4dbe9c1218a03cd54634b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections