General

  • Target

    2024-06-24_bb23ca1ca56780b7356f0b3dcb9aae56_cryptolocker

  • Size

    43KB

  • MD5

    bb23ca1ca56780b7356f0b3dcb9aae56

  • SHA1

    123714d88fee573780533bdca93c3c3e6a354edc

  • SHA256

    7f28f5bc3584a77254f8de7a4c666262c4940ca29dfe3ec3d110e105a0854ee9

  • SHA512

    76cc20a386450c746446015ba79564660fa6c15397315b64fe3ece0bd9ac83672e6a1bf171fedba36649c30aa95dcab345cace0550e0d4d565e6c41ee855df09

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsJc:bO6YcA/Xk3wXFXSqAJx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-24_bb23ca1ca56780b7356f0b3dcb9aae56_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections