General

  • Target

    2024-05-22_716cb4d0245e630ced8e77133662b2a7_cryptolocker

  • Size

    53KB

  • MD5

    716cb4d0245e630ced8e77133662b2a7

  • SHA1

    c7d37e5ddf2f24ccc453307d7d44de34a3d2feca

  • SHA256

    13c7fa01e52ad96a95b173a8bbd6493e798d424c8f1d5d896d99efaa7f2120ee

  • SHA512

    2c5f03708c808ac539c9a84bb92a9599a59a69a06c774e71bcd0d766bb2b814055cfbe91f471fe85a8ceb7869de4c21d5721fca27a1da2e07c1a9550b1e50941

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO2:bODOw9acifAoc+v5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_716cb4d0245e630ced8e77133662b2a7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections