General

  • Target

    2024-05-01_faa7d9b9a210084c0c13fd360700f53a_cryptolocker

  • Size

    56KB

  • MD5

    faa7d9b9a210084c0c13fd360700f53a

  • SHA1

    e592391e90fd040309a3fd4c26a4d4fa5cc24e67

  • SHA256

    2a23e8613262664b9bd630895806775e323a176f6ab76d72cb38e51610f52429

  • SHA512

    570ab10d15f960641d623b97d972e26ad3ca93466e2a1e89512589ad4b082bc1fef2a0f468066552ec21d2ca3e79efdb6bcf37e376216f2a92fbb55ea136da7d

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlbU:bP9g/xtCS3Dxx0AU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_faa7d9b9a210084c0c13fd360700f53a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections