General

  • Target

    2024-05-17_7fd2152cf8f89053942d61f137725b86_cryptolocker

  • Size

    63KB

  • MD5

    7fd2152cf8f89053942d61f137725b86

  • SHA1

    5fe90762c4b5f682293cd0ccaa563642f9119f7a

  • SHA256

    c02874c6affb005c99908830b2193649a850f0f3e37f74a8561ca5621d0ca190

  • SHA512

    502ce644075f61e941eee186031daae34cc155272b5dbe88934c03c7f17d0e162e723d6be31260d999b88395890f34f2091d9efc9f99083d5781f94856cccb99

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKo:P8mnK6QFElP6n+gymddpMOtEvwDpjYMv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_7fd2152cf8f89053942d61f137725b86_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections