General

  • Target

    2024-05-11_e3451252d483e563ec7bf3471fbfc89f_cryptolocker

  • Size

    51KB

  • MD5

    e3451252d483e563ec7bf3471fbfc89f

  • SHA1

    23f4cbe0100ad173172cbe8cdb7f963a5f2b46ef

  • SHA256

    a1c5e45ef09dba2657bb4502118720b7467fc1009556876d5356d5fafe414cd9

  • SHA512

    cf45ebf97581ed20da317eb8b098985c6c7009549f0989253b58a701c05e400b3c27a701fb5d90a755cf71398cfb001065805e4ac9f3f558be2389a2d0ab2d5b

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOp:bODOw9acifAoc+ve

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_e3451252d483e563ec7bf3471fbfc89f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections