General

  • Target

    2024-05-08_10eaa4028a7eeca8a21ca3639dc80d83_cryptolocker

  • Size

    51KB

  • MD5

    10eaa4028a7eeca8a21ca3639dc80d83

  • SHA1

    9a804d1694aecdf3449e0814501e3f3d31985048

  • SHA256

    c52b3d07940cf3290081c8fbd72bfcf265fb182d52e9f2108cfa0ca9444fec93

  • SHA512

    dedde3d835ec66d792f2bfa9310bb1e5629e080f8929a5911473b9b64a4ae52abcfad408fcbda90f0f5d5a4b3840903a4b3d05e70a20bc21f815cb904b0b6f04

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOL:bODOw9acifAoc+vA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-08_10eaa4028a7eeca8a21ca3639dc80d83_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections