General

  • Target

    2024-06-10_211fba00fba7d59896d0ea144970f754_cryptolocker

  • Size

    33KB

  • MD5

    211fba00fba7d59896d0ea144970f754

  • SHA1

    bd6ffbe1cebf5bcc461215404f32a4db419a7e07

  • SHA256

    b7de1675963c4a55186280fe63b1026db1dd8142e0d5a9ac2ea15ed1dabf6f12

  • SHA512

    65919fb5107ca521b0132ce2096128cea52868fc203b8b7521c82562ea4607b624d1fa1398b4b5f6d63797706e60f224a908569ef2ec46e62d50b6c95975cb90

  • SSDEEP

    768:q46yu4M3Eu2smnbcuyD7U9dtOOtEvwDpjeMLa5vONre:q4ZbMb2pnouy8TMOtEvwDpjjaKy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_211fba00fba7d59896d0ea144970f754_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections