General

  • Target

    2024-05-29_53c6e20a6647894e9487eacd69c43fcf_cryptolocker

  • Size

    53KB

  • MD5

    53c6e20a6647894e9487eacd69c43fcf

  • SHA1

    ff659ca8fa0e45f99e8227ad7a2100849124fe3d

  • SHA256

    d475970bc0c58bac2f49e134a54d886565d5cf0b5ad60fe00440cf34c621b47f

  • SHA512

    600170b7a86b767632e9cd7650e29c7ceeb97a21eaf018388f392598a2621be9e1cd52e411a6bad42b03b2f93d50c1d6921fdf47441de1fe13df6492e492e9c3

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXP:bODOw9acifAoc+vk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_53c6e20a6647894e9487eacd69c43fcf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections