General

  • Target

    2024-06-12_83757bc73e85e33b51bcb5b6df705b1e_cryptolocker

  • Size

    36KB

  • MD5

    83757bc73e85e33b51bcb5b6df705b1e

  • SHA1

    22e8121b88e9a53a31e954f4464771b066672e40

  • SHA256

    6cceac51aca667a3f44b881d6349c7d313d150739a0732ecb94143060ab62329

  • SHA512

    bceb8f71fc19d0556e700937110f278326d13187edebe09bd74098e89c077267521f5531b346a2aefcf3c3f8de5a36126c640347e9805b75f484f490eaf00af4

  • SSDEEP

    768:bSOjawZEjbhxnbcuyD7U9kXfn62tH/1/LpPFPn:bSO2wZEjbnouy8Gv6iH/NLpd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_83757bc73e85e33b51bcb5b6df705b1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections