General

  • Target

    2024-06-13_66a671dba5ec1592ed194cb88a0faeb2_cryptolocker

  • Size

    33KB

  • MD5

    66a671dba5ec1592ed194cb88a0faeb2

  • SHA1

    1d2507bd92ada077a1ab1ffbfbcb3251d6a45ed2

  • SHA256

    48f1f91c94616aab2a3b5ec3229946c3123aa9e31bd746d4a3c125a369c92511

  • SHA512

    69554e7693d1d9b32e951df9111c7b31a7df6d02614f9c3446df9df90c37ec5e1cc08a6e9e2090e0d46e03ee2f43fbf89411186fd425a9796f5a59692fd74546

  • SSDEEP

    768:bROjawZEjbhxnbcuyD7U9kXfn62tH/1/LpP+2:bRO2wZEjbnouy8Gv6iH/NLpP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_66a671dba5ec1592ed194cb88a0faeb2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections