General

  • Target

    2024-06-02_f544889c0465942dcd15a93a97f5dc91_cryptolocker

  • Size

    53KB

  • MD5

    f544889c0465942dcd15a93a97f5dc91

  • SHA1

    6d2fb3acbae3e97b0411f0e26bc1201c87c65bfe

  • SHA256

    a17b5b61b6bd25454664c306ab6ff8f254983ce8797824ddde87019deb796ded

  • SHA512

    daada3e0cec64a8887bbee073deb73cb2de1be5f50cbba76d69458ca36afdcab6a54535c68443421dee3fa52f133bcbedf893ee41d14feaf3d8746e3815e7cb7

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOt:bODOw9acifAoc+vi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_f544889c0465942dcd15a93a97f5dc91_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections