General

  • Target

    2024-05-04_7b05295d284d0448ab00d2de66825e23_cryptolocker

  • Size

    55KB

  • MD5

    7b05295d284d0448ab00d2de66825e23

  • SHA1

    40755145ddf29dfd74ac71c3dec19379b5e14b57

  • SHA256

    93bcc551f6d706628465ddc6c6a294edcfd59e15b07013e903b9910b99d3f9e6

  • SHA512

    130476248eb7c2e69fcb94d52f5f4ce8d3895150785c159fae7c22a360891bbcac615845841bca148d5d9a4275446f544fde1a2ba761a9c34d058d397f4a628e

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzz:bP9g/xtCS3Dxx0nz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_7b05295d284d0448ab00d2de66825e23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections