General

  • Target

    2024-06-02_7cb0e5c403aad7b9db6efd1703835569_cryptolocker

  • Size

    57KB

  • MD5

    7cb0e5c403aad7b9db6efd1703835569

  • SHA1

    69a3000d6c36898f899d64c8677ce600d214da7c

  • SHA256

    e3e10923b4fdffad48da009a0bb0800dbf5510f9cf7c0023b35c8f881ae77513

  • SHA512

    50547956e9393524f45239d2172589f70da11149873002545049f36818a64f4c7c16328ec4ac94873c8d59757a885ba137ab25a848004175c5597198c9b0457f

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgzz:bP9g/xtCS3Dxx0nz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_7cb0e5c403aad7b9db6efd1703835569_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections