General

  • Target

    2024-05-05_51fa314bca6afcc0c9b6e82d97c358c1_cryptolocker

  • Size

    89KB

  • MD5

    51fa314bca6afcc0c9b6e82d97c358c1

  • SHA1

    0b4cea49506e22aba19e3e2f110db1531812c95a

  • SHA256

    4cced198d0ef6c5d82d15e0723302d09c1593cbac9eead56f81f685a10171a75

  • SHA512

    a1fabd66d8d6dc5b85debe1eb1e3b32901673238f67490d8a0ccfbb4a371afbe685268d12419c02c1b3b67bd78871b0fd9226871cca994410c3067ca48a0954d

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAq:n6a+1SEOtEvwDpjYYvQd2Pq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-05_51fa314bca6afcc0c9b6e82d97c358c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections