General

  • Target

    2024-05-11_f7ec2495ad7e7b166f30acc430e6389b_cryptolocker

  • Size

    52KB

  • MD5

    f7ec2495ad7e7b166f30acc430e6389b

  • SHA1

    a5bb9660f4a100d4d4cff79b79b38ea62485c50b

  • SHA256

    d421f99f66d5ac8c8b61114f6da72c39b28050f16aa2e5c6da23e5842e48b75b

  • SHA512

    fe458420c8288d4d140aaaec1309be7e711e92a01b2b5876ac9e38e43161d94319f8afe1679138671a4ef9f96c4a8d3a545d2bcd3e88b9425aae6f7c25882a08

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO1x:bODOw9acifAoc+vI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_f7ec2495ad7e7b166f30acc430e6389b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections