General

  • Target

    2024-06-10_d03ece56c73e36c6f800a83d4aaa5533_cryptolocker

  • Size

    26KB

  • MD5

    d03ece56c73e36c6f800a83d4aaa5533

  • SHA1

    2146d99c6c1f639d4d8c520f0825d154ed2a9c96

  • SHA256

    14ceb534b052a481ec6312cec9bf97bbc13ce08e54da18dd01661e5b27358bc4

  • SHA512

    57a1886228b2522e2cf823bedeff5b4e06562fc713a2e8c3e6468d3ec6f516dfd0d8022d407eea5273f5f2cd5e007eff9b2acb15fb0c166462af1fa96763566c

  • SSDEEP

    384:bjWBAr5fx5H611wawEQ6beWTqpaNJawcudoD7U9I/zziYwI62t6eJ:bCOjawZEjbhxnbcuyD7U9kXfn62tDJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_d03ece56c73e36c6f800a83d4aaa5533_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections