General

  • Target

    2024-06-11_d96cf1fd3e411abb902275bdf08c40f7_cryptolocker

  • Size

    56KB

  • MD5

    d96cf1fd3e411abb902275bdf08c40f7

  • SHA1

    d3dd0d633f11ad10194e1a7e3711a9c967c3ecc4

  • SHA256

    87fb1a8803f79137484c6a939951779d1ea7e9c102f18b9a4d3538964d4a9852

  • SHA512

    bfe7b3f6610603cda3e090eb38e77bb2e525303a2bdcf2d3c1ba99d66b68692d6a2e2472953c8280af08377f7338e8b0937511e8bef22afbf1e7ed58447c2502

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlugJ1:bP9g/xtCS3Dxx0e1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_d96cf1fd3e411abb902275bdf08c40f7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections