General

  • Target

    2024-04-23_5d7c5f5ac0586a5772989b8441b36cb2_cryptolocker

  • Size

    79KB

  • MD5

    5d7c5f5ac0586a5772989b8441b36cb2

  • SHA1

    34f20d6759ca067e5de4e25697e7c15d74ceeb2c

  • SHA256

    6acc526280f20fde236597eafac8cb304bb6c7d9ac6e28af23ea75e07a8c0b9c

  • SHA512

    5c791cd589c1a699d572ae67c52910b4707d396dfd09400625ad6a0439811e4e42ae22de98c97774b9cbd07d8ca24464058a737b1c35f22994df392c48c04b6b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdc:T6a+rdOOtEvwDpjNt2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_5d7c5f5ac0586a5772989b8441b36cb2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections