General

  • Target

    2024-05-12_860c1e86b3f520fb2341910a58f993cb_cryptolocker

  • Size

    56KB

  • MD5

    860c1e86b3f520fb2341910a58f993cb

  • SHA1

    210ca3d814bd2974c692228c0695db423594c04e

  • SHA256

    1a33e8bf7a6ee45190d79a337a8b3cac564d4b60cd6c1c06a9a4a44450f82d10

  • SHA512

    ed07bb1f1c0536ed4f68ef125fdd3ffd7d70e71663707b1d99f674f7beea667895ade83e6045b1ac60810c08c3db3a91246cc8dd72cb2583dffb84ee29bb63ec

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+R:bP9g/xtCS3Dxx0JR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_860c1e86b3f520fb2341910a58f993cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections