General

  • Target

    2024-05-13_5a2f3fed8193dfe55e7744c0ae6aeaed_cryptolocker

  • Size

    56KB

  • MD5

    5a2f3fed8193dfe55e7744c0ae6aeaed

  • SHA1

    ca43e1cfb56ad0c85fcf3f2ba9c124c66dc54aea

  • SHA256

    34c95d7df4a73c4efd52d53cf6c89582805f91657653582e513f66cfcba54f94

  • SHA512

    59b8f470a1f2a14d1e1289d32daf2ebed7b1035b292375c3a30d3f2b809c4e2694146736de140ac07a7792a27cf69785474eff8153b91d3077b318eb643111d5

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlM:bP9g/xtCS3Dxx0n

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_5a2f3fed8193dfe55e7744c0ae6aeaed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections