General

  • Target

    2024-06-11_29ea17ee4fb77dcaebc153065c6e7d37_cryptolocker

  • Size

    56KB

  • MD5

    29ea17ee4fb77dcaebc153065c6e7d37

  • SHA1

    d82554f9092576f24f39d1f3d6cff4bf87c06052

  • SHA256

    ca4637ec633189404b2ea8c616549adecb48c61ea4fcd0614b6328c623c71034

  • SHA512

    12996720cb446f3858045582a487f83942e67ba357912eb86f09256744c7fbed712c03dfeeb4bd21932dc57dd6d21401f34f9328f12120b757c5510c038471c2

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlugJK:bP9g/xtCS3Dxx0eK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_29ea17ee4fb77dcaebc153065c6e7d37_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections