General

  • Target

    2024-06-24_d3eb4fa17b78adaa49d7dfbe33100204_cryptolocker

  • Size

    43KB

  • MD5

    d3eb4fa17b78adaa49d7dfbe33100204

  • SHA1

    1229767eb9dd6efd5dfe90230710c2d022baee71

  • SHA256

    500e9182e8134e748aeccfad12a2411c074a538462e29a59fc1b73aa53d84f9a

  • SHA512

    72300aa47b9f8df1247767b0f16b0b51e6e131cdcc0d432d323d434967701344b5f0e30e9e946af128f17bd969393182120051f37597c917334a6d2500ebb6c6

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsJV:bO6YcA/Xk3wXFXSqAJA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-24_d3eb4fa17b78adaa49d7dfbe33100204_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections