General

  • Target

    2024-05-10_a5733ef1e3a2e96422e269dd38a4564a_cryptolocker

  • Size

    51KB

  • MD5

    a5733ef1e3a2e96422e269dd38a4564a

  • SHA1

    ad8575f7a624c990cb017553bbf05fe9f211ced7

  • SHA256

    231324412ce846b9766a1f7f5a560debdeab1b852f4a8a69e494ab190d5b2ec9

  • SHA512

    0a393ba106cf0a6d9f39f1c0c92bc05862ccab9c90533efa158aabde43a4a24e08c1775c4b6a1550e78e15375b1b1e773bc5d3e1eea0c1ae5b92f55f5a4497d1

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXu:bODOw9acifAoc+vXu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_a5733ef1e3a2e96422e269dd38a4564a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections