General

  • Target

    2024-05-24_f52a67e0b0151859470409b757de65de_cryptolocker

  • Size

    66KB

  • MD5

    f52a67e0b0151859470409b757de65de

  • SHA1

    49f1d4307cf5036796161e400742589874adba26

  • SHA256

    5639001e4088e9ff7518a97ada8d0a577c783a51c627f79a03b8853fdae1c259

  • SHA512

    7dc3ade0e932aac071182360574e636bae9b558da09ca98d50169aa50c1914be965e6eeccfe9ac6640a874af6111c3c0439b661dd6e83e9f5ed6dcf62ccc5faa

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyfP:1nK6a+qdOOtEvwDpjc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_f52a67e0b0151859470409b757de65de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections