General

  • Target

    2024-05-21_b2c0a07107f6aac86c3cacf8a5400d4a_cryptolocker

  • Size

    57KB

  • MD5

    b2c0a07107f6aac86c3cacf8a5400d4a

  • SHA1

    f22f4e53357a0caa2bfb0b207bc9c9a70c06c486

  • SHA256

    d5104985ca3b72304558680aaa508f2f5f4a2846764e0b4b9c8dd10f2e0f4ec7

  • SHA512

    3d6ab79da1c5930c99dc0458ead578e452629550d629615ff17171dd6dd32904f3e95e4ab52d34452e65bcd06475a3ae4abacc32911896d66f306dc0af963714

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzqE:bP9g/xtCS3Dxx0nqE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_b2c0a07107f6aac86c3cacf8a5400d4a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections