General

  • Target

    2024-05-14_87e0f3f39cf236465ecaac175f0550a2_cryptolocker

  • Size

    56KB

  • MD5

    87e0f3f39cf236465ecaac175f0550a2

  • SHA1

    a85f2376c26b70b972d7294a0de90974b6552271

  • SHA256

    fa6ed32ff6b8b3c5de4e3878d040c77848686fe93b51226e1aca7efd16fb5823

  • SHA512

    fdd1171ba7ed5f296431f3e575375d4dac71a2ce0db1e6c0991c28fc85b73f8edf85e6540a5dd15d7b55ae05d2df52bad77ec1cb75db9f74f26d767e85ebfe34

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjllO:bP9g/xtCS3Dxx0sO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_87e0f3f39cf236465ecaac175f0550a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections