General

  • Target

    2024-06-02_e555340ea575a8386cbbf8209d9548c2_cryptolocker

  • Size

    42KB

  • MD5

    e555340ea575a8386cbbf8209d9548c2

  • SHA1

    6003394b50cd91de36ca27578b0cb79ee0ada8fb

  • SHA256

    76ec4ca8da0121a34053196b645d3ca3fa25fa5e30608f957b378340c059bb60

  • SHA512

    1fbbfa3cfbc9d3baf769c4f014eda0bac04982620be9a6704f6ab8001fc6c581e6ecc918072f77959266f853d09aa7015cbc63d210b42772db4fdd1a663d87ca

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHTEXS:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_e555340ea575a8386cbbf8209d9548c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections