General

  • Target

    2024-05-09_5ccfb4ba15ed8d99d53f3381b1b16e24_cryptolocker

  • Size

    65KB

  • MD5

    5ccfb4ba15ed8d99d53f3381b1b16e24

  • SHA1

    26715ed10c3a82f9a723249ff93d9f2ffbe630df

  • SHA256

    7ade60a28e003632473d2629ed0fadde50a8db099e7f55c0fc7d5ce81dc79a7a

  • SHA512

    ba661d5cf6699382940ce9db16b17ab26a19f9f9d6a6ffd02adb223bb090979d65a90ee23a7110361469d4d8609e88b3effdb5f854687a78495d4046fa8cd7ee

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXK:1nK6a+qdOOtEvwDpjK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_5ccfb4ba15ed8d99d53f3381b1b16e24_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections