General

  • Target

    2024-06-08_d7a6af958c9e220887417408b1653339_cryptolocker

  • Size

    57KB

  • MD5

    d7a6af958c9e220887417408b1653339

  • SHA1

    c628b05f21c636e32bcc04624bbb2c63af238a0d

  • SHA256

    63e4f6f6abafbdf9c0cba77228a182040c9f248b85948250a395e4c2ba40d0fa

  • SHA512

    dd0d1e2c2fe14f4292068a6452ac3e792d5ec62bd7f9320682dc6d22299c0b8d5d7000966cb6c9e5150606390fb228144c4c941cf861b27ce58b56dab508c4cb

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzCG:bP9g/xtCS3Dxx0nCG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-08_d7a6af958c9e220887417408b1653339_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections