General

  • Target

    2024-05-08_135930d2dcd38344a2d2524ba78315be_cryptolocker

  • Size

    50KB

  • MD5

    135930d2dcd38344a2d2524ba78315be

  • SHA1

    cf5408d0c2f20e949e71b6d93f18a408c2c9fe8c

  • SHA256

    a2b18be2d38e0885033f737aaadca3ae2a08786260f41290362af96749237b9d

  • SHA512

    2c670fb1fec377be137c1d1982aacd5d68dd69fd49f6027ffa970c95b7138e7bad4d0f528b58c32806563e4a80d22ac52a842599fc6644605eeaaab7bda7bf0d

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXx:bODOw9acifAoc+vXx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-08_135930d2dcd38344a2d2524ba78315be_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections