General

  • Target

    2024-06-14_f8c25afc6e6af203d4aa25633b4c294d_cryptolocker

  • Size

    25KB

  • MD5

    f8c25afc6e6af203d4aa25633b4c294d

  • SHA1

    427918606d0bc650560ec9e3be0ad3c15f26d03f

  • SHA256

    dc486584043a9f7c9c2006d3fdb0b3d31b605ff80ea64fc0fde6f5b85f34822d

  • SHA512

    f31e1d3a4604fb10f32a2ff218f4e98395b0b63c363088d2dc3fe6458a944297c80d2ae3776c63f6d38c8115d0badbc46b8ffb153dcb0bcee406d7b3eac6852f

  • SSDEEP

    384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTt:bYOdVB2jXUrMkvnbcuyD7UFXOR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_f8c25afc6e6af203d4aa25633b4c294d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections