General

  • Target

    2024-05-13_d5c7ebeca91e5f1747c9396526314ec1_cryptolocker

  • Size

    51KB

  • MD5

    d5c7ebeca91e5f1747c9396526314ec1

  • SHA1

    a8d4d00d38dcea1e90f65815f15f97c5a1d643c3

  • SHA256

    7dc194c8e9cedfb4c47421a92cd70b4902abd22f00eaf839c4b2f8bef1f93e61

  • SHA512

    fc32c151b3ddfba7b20251d5435b89854e8d4ccfdbcb4c37d0da782f27c15b9c92e4988e2ca3a493c611888882c53b94aa85736798f37a273e5aae994e7b6f94

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvt/:bODOw9acifAoc+v/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_d5c7ebeca91e5f1747c9396526314ec1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections