General

  • Target

    2024-05-21_10371e68f07ba70c6a72680437a38471_cryptolocker

  • Size

    42KB

  • MD5

    10371e68f07ba70c6a72680437a38471

  • SHA1

    2559cebc266f45995ba747c165e7ed2faa33a5d3

  • SHA256

    e6833aca7e9f210eb69ef278716580928a9ba3560b44da4cdf3e28e10406f779

  • SHA512

    04a75872f1462a7d7ea3d8d62399ec16e7dbd293b2c483ec6793eaf7880b9c83cdf9b312ee21ece9f3954bb09548a874168ab5b6ae3ed4782c30708e688ca8c0

  • SSDEEP

    768:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoWOd:ba6YcA/Xk3wXFXSqAJid

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_10371e68f07ba70c6a72680437a38471_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections