General

  • Target

    2024-05-15_617f5e9e1ef291099fa22d1a8b38b212_cryptolocker

  • Size

    52KB

  • MD5

    617f5e9e1ef291099fa22d1a8b38b212

  • SHA1

    101457def355ff96f0942f763e2577fece246488

  • SHA256

    4189740445ff86ef07938015c9c98527a2c6d19c8e6314b5aa46d730ce57e7df

  • SHA512

    6d84ce15758b0f73331140e2d88f0df67fa155b0eb2df264b0912b793c1b2c144ff947ab2d03efb19a3cba1f35c577ca9608ba2e5bc5aca4ce7371b98ff57d4a

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO3:bODOw9acifAoc+vc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_617f5e9e1ef291099fa22d1a8b38b212_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections