General

  • Target

    2024-05-25_7e5891d51ff54d49b470156a4600d1b9_cryptolocker

  • Size

    56KB

  • MD5

    7e5891d51ff54d49b470156a4600d1b9

  • SHA1

    fd127cfc6e94c6ec94206ab5fc204d4b394e26e9

  • SHA256

    dec4aef92d622804dce2ad1a5af51a29ee6cec5e44250ee2ffff701a51005f64

  • SHA512

    1eeb26af1fc8da4ea237a3107c781b522de501df6b053709ab436e9365048521b4582f6310c2c636a759f56cf02210a43f7e9d2d7694bed88734f2305aeb53d9

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl/:bP9g/xtCS3Dxx00

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_7e5891d51ff54d49b470156a4600d1b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections