General

  • Target

    2024-05-12_a5e1f58e706358321e605ae12e66001f_cryptolocker

  • Size

    65KB

  • MD5

    a5e1f58e706358321e605ae12e66001f

  • SHA1

    e1ff9fabe81a993bfd8b7298ce7348fee8a625a0

  • SHA256

    d3843167d50339ef59de24ee4f2744d1bb5d787fb49fa3398f28589f89a42c0c

  • SHA512

    8a6e552c15d7f3faac2b2390a5bd8ee1de999d3c6e4b12d5e3effbe78dc34893895c63f7e38a60f3eeb7b2aa2cf343e4d78baf75386dbb5c134de10074bff91b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXD:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_a5e1f58e706358321e605ae12e66001f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections