General

  • Target

    2024-05-14_51e52c80db8648b0ee33440380bba9aa_cryptolocker

  • Size

    41KB

  • MD5

    51e52c80db8648b0ee33440380bba9aa

  • SHA1

    16c21362a8b2a593bfa6508b86ce1ffe1b07ebdb

  • SHA256

    75d35de92cd55b9933d36d29cb59144fff3589d8cbd8337ae90a6b9bd60f6b4a

  • SHA512

    1a651550c58c1cefc46b5f012199961c8c24653765341a062a9430b25d3bcf24510d82c7ea70bc70d7ed6157585e3993c755efeff484bbff43b810c5e22a5744

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHy:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_51e52c80db8648b0ee33440380bba9aa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections