General

  • Target

    2024-05-13_afe56c00b3ed356b6c38171fba9f42ad_cryptolocker

  • Size

    58KB

  • MD5

    afe56c00b3ed356b6c38171fba9f42ad

  • SHA1

    799951daaf3341d524298d113cd6409af44ec80e

  • SHA256

    5d71c281f76624e80c40f85b4412dc32dab5394a762d115185552475386dbef8

  • SHA512

    c80f1653f5ae8f0100a71d88cfb179423000eab44ff2a20d4e2770f728b1dc14e565a0c6c62998912ebf04d30a4db713705142004b234dee2add93bb549b399e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+NJ:z6QFElP6n+gKmddpMOtEvwDpj9aYaq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_afe56c00b3ed356b6c38171fba9f42ad_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections