General

  • Target

    2024-06-07_38c4991ace4910f900955bc33e45d3c3_cryptolocker

  • Size

    53KB

  • MD5

    38c4991ace4910f900955bc33e45d3c3

  • SHA1

    f4148dcfb448021be633a26a501302fc076dce1c

  • SHA256

    e56801271007abf5655944caef2003e8806839014527c17a5b94482d39adb707

  • SHA512

    e388e91c28e890a4cb96e78cf027104410663e3f7f4dafeaa41359e5bb561317c9159980873d80fe3b2b196be0cf5bff2d9a5b05525ec9dadb8f15fece377fb8

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXy:bODOw9acifAoc+vd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-07_38c4991ace4910f900955bc33e45d3c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections