General

  • Target

    2024-05-17_59ffeeb9a8bee0116b52ac3fd7f0d4cb_cryptolocker

  • Size

    52KB

  • MD5

    59ffeeb9a8bee0116b52ac3fd7f0d4cb

  • SHA1

    f5e314ac1ac6175c1d336287719f8a5d9363e1a3

  • SHA256

    2a5d6e6ca80f1b19c899cf4bb24594f30001c9eca1be8e6e270f191ee4ea426f

  • SHA512

    3c18b7f0f5ab78036c7feb71244aa471dcf364a242b9a1d19cd62c8584558a1ba1206d98c935a7fde1745859b8fa6dcfb5d178fc2414678d4740942aa205f083

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOl:bODOw9acifAoc+vy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_59ffeeb9a8bee0116b52ac3fd7f0d4cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections