General

  • Target

    2024-05-24_e859f34f919d2e75e3448cd2b6645137_cryptolocker

  • Size

    57KB

  • MD5

    e859f34f919d2e75e3448cd2b6645137

  • SHA1

    f079e15ded2fe7e683095c55678791799d329fea

  • SHA256

    8f3c0fcc7a1a6f7614397f804267a625873a3187dba42cb3a172f4cedc56ebfa

  • SHA512

    0190e3f4393d93c885f5b9081593dcd4a8cb777e439eb1ed68577772f697268dad0aada2467d61e87cb14ba95b2bc0c7556cc6a96608dc10756c260c6ef77bd9

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzY:bP9g/xtCS3Dxx0nY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_e859f34f919d2e75e3448cd2b6645137_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections