General

  • Target

    2024-05-20_b55bd12ff92ca45d15425776c52708dd_cryptolocker

  • Size

    94KB

  • MD5

    b55bd12ff92ca45d15425776c52708dd

  • SHA1

    2f32a0e6a653e75ede0e45303100f84d945633cf

  • SHA256

    e53ea72e0179fc37b8277c34dcdcbaa3b87150256d9704908220d8ed3584cbcf

  • SHA512

    be8d3702ab381a53ac5c128fd0f6c915eacf995074d6a95b78e269113224255e88ce692cbfbc0aeedfbf44d11262f3b038127193d2c8fcece4a48d564c621d16

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/ks:zCsanOtEvwDpjB3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_b55bd12ff92ca45d15425776c52708dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections