General

  • Target

    2024-05-14_05ab73266d3e66f17bd8eafe52d4aa03_cryptolocker

  • Size

    56KB

  • MD5

    05ab73266d3e66f17bd8eafe52d4aa03

  • SHA1

    e262d72b7cc4e9a2948e77c742de79687f31ede5

  • SHA256

    cf92a88b38af70859994e83a57bdb8b58e8370d54d14ef3396cb38a1eaaec38d

  • SHA512

    a1ab6a4a90091e96932eb3bb3d7be8284b1f6b0ceb8e3f6295f1c51d8a5a3473a35577dfa95fd03ec99369057a337e0ced7e8286806d4f7a498d33e870bf444c

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYRq:bP9g/xtCS3Dxx0L4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_05ab73266d3e66f17bd8eafe52d4aa03_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections