General

  • Target

    2024-06-25_1507a1622029632e151e4611c26329ab_cryptolocker

  • Size

    54KB

  • MD5

    1507a1622029632e151e4611c26329ab

  • SHA1

    027a00cf0fb575e3f8ed7f9374d7cbc0cff620a5

  • SHA256

    29f2731e800e5fce059edaff1e47e1f60cb4b958ed56067f12e19913f21ff91c

  • SHA512

    0e33572421416ceaf8351014b63046d6a0bbb3eaa45b13e99952dc1f788c524d6bdc30bd1e90c7f62d1c8694760204043bc2b0b73580fd08650d1a05727482b0

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPX:b7/y28wZEjbnouy8G76iH/NLpd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-25_1507a1622029632e151e4611c26329ab_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections