General

  • Target

    2024-06-02_05adee7176d254bed87ec742a833cdd5_cryptolocker

  • Size

    57KB

  • MD5

    05adee7176d254bed87ec742a833cdd5

  • SHA1

    e55873890e032cdfac9e1991e06abc85b0b26cdb

  • SHA256

    7809301fbf483df4bba3847754533849fb0882303c690a01a41a0cfc88064053

  • SHA512

    57d94c0ebb7a2894c6121592c31a26a54508c83cdc399c9284e9f188e61ffdf244f8cd881dd747385b345d02da1c5b9a73699984a1dfc9b356182e714451c203

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzCY:bP9g/xtCS3Dxx0nCY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_05adee7176d254bed87ec742a833cdd5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections