General

  • Target

    2024-04-11_f5f510830dd6ab67fcdfa926f1a6e499_cryptolocker

  • Size

    73KB

  • MD5

    f5f510830dd6ab67fcdfa926f1a6e499

  • SHA1

    5b421cc4c21e86fe3e8bee9816ab702f8b0fd7ee

  • SHA256

    939834c0e20e46962155550fd09a4e90729a02d40522d19afa03cb79a74050de

  • SHA512

    b2d50ced7a646b6afcb6bbf4fd687f4ce10956c07c37b3015ab9e1c9153bdea65a133d8a6636153816fe17cb19ce2525ef5806004fb21ed37c637a4849b0ea0c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalPt:1nK6a+qdOOtEvwDpj0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_f5f510830dd6ab67fcdfa926f1a6e499_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections