General

  • Target

    2024-05-11_54c204b8513aecf7c652616f05a7c1c6_cryptolocker

  • Size

    56KB

  • MD5

    54c204b8513aecf7c652616f05a7c1c6

  • SHA1

    bf278f56bc909a43fc6f6f32b4c664848fc6418b

  • SHA256

    e7e9bb40d368e4b9e8a4c5c4d8651cc0f524813e7bff41a9a118d56a43114ab0

  • SHA512

    35e2b4e08a5799d978d5c4c2a54716eea0bcc1cd2e1fd0ab7456ab21ead9da908697d598866d249332a8534b0aaf74f8ca99cf1531d846d3e9c550a6082ecb5e

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+H:bP9g/xtCS3Dxx0JH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_54c204b8513aecf7c652616f05a7c1c6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections