General

  • Target

    2024-05-31_5bf30fbd5ec88e41cbdc516b83dee17f_cryptolocker

  • Size

    52KB

  • MD5

    5bf30fbd5ec88e41cbdc516b83dee17f

  • SHA1

    6d3ce405fe352fcc8c23e287d8fcc4d749bea272

  • SHA256

    263fc7c65374290d53110450f44a25b98dde4fef69f8699a4d716f20fc486b55

  • SHA512

    2c59c5c6efc31546535b8762f80660605299a546d3b0dce6121d579e2d435df60c2ae322ffa2275918e94081adb57af48ce1d8976d39bc3ec106314373070024

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXiJ:bODOw9acifAoc+vXiJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_5bf30fbd5ec88e41cbdc516b83dee17f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections