General

  • Target

    2024-05-22_8e8b6c95518ad4f140f3a584468b1223_cryptolocker

  • Size

    55KB

  • MD5

    8e8b6c95518ad4f140f3a584468b1223

  • SHA1

    f523c9b0ad9862a6f092e69e99db4b03559ead00

  • SHA256

    212f596b4d26b1b188ad1e08f552e035fa24a51bda350087a127fb05c3debdf5

  • SHA512

    efc0188aebde4d4b979ab371800377eca43d4258b5f9d1b009bc380223d2e639c7d684195173c5de93164831765b5571694f2fde4cf6f86d6668395473b9610f

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlr:bP9g/xtCS3Dxx0w

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_8e8b6c95518ad4f140f3a584468b1223_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections