General

  • Target

    2024-05-05_a260d2dde7b14d6daab6e409d1e947f5_cryptolocker

  • Size

    56KB

  • MD5

    a260d2dde7b14d6daab6e409d1e947f5

  • SHA1

    a685cfce349d8796c0ef18d5e61a17215fab57c3

  • SHA256

    adc6408fb9654b4cd9f6ef5e6f795620452219ba96f6608fe4425b681b00afdd

  • SHA512

    3279bd0601e6076ebaf6064c99ca5d633b891d51a15d3b8424aecfd592c9e1f718bbe5226254f378e4b69f1d8ffe307c5aa05d6f9efe35899668f4a56d8644f7

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzo:bP9g/xtCS3Dxx0no

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-05_a260d2dde7b14d6daab6e409d1e947f5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections