General

  • Target

    2024-05-14_8f1b570c3ef65e9a96b112d3e3c1f500_cryptolocker

  • Size

    56KB

  • MD5

    8f1b570c3ef65e9a96b112d3e3c1f500

  • SHA1

    5a50c0cd371e89a732d1a18cf0406b901f7dceea

  • SHA256

    ca4cea394cd7dfbff09f53dea1c9dde485eb5d06840740415145ad3c4e5f82e6

  • SHA512

    bbc5f24ee9193cf53ce4cdc17915bbd236bd7253d8e764005db973090bee8c153133dfd11536097fbc06460eb603dede4b375382c5ef875dea6e181c202447da

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlbQ9HEA:bP9g/xtCS3Dxx0AQlj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_8f1b570c3ef65e9a96b112d3e3c1f500_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections