General

  • Target

    2024-05-30_ca715b85ad4e112379c3768a79bce364_cryptolocker

  • Size

    56KB

  • MD5

    ca715b85ad4e112379c3768a79bce364

  • SHA1

    8e9e9a35dc4f80b677e387532096cdb11caf80c0

  • SHA256

    3f4086966bb60d19d64efc26eaa3148f788df1a1c4e474c598e947be58ccf047

  • SHA512

    a944d3863c4ee7624e4ac1e487a6e3b3d89d08a4664631bdf61bb298b392a9d4a2628e06edfb28208b95cbfdc7a076dfbd513baaf051e4503f7f54e5a0768b79

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYe:bP9g/xtCS3Dxx0Le

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_ca715b85ad4e112379c3768a79bce364_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections