General

  • Target

    2024-06-14_59b5effcbe9c81112c1f6588b8876fd2_cryptolocker

  • Size

    53KB

  • MD5

    59b5effcbe9c81112c1f6588b8876fd2

  • SHA1

    da2f95aeee27cf261603c49f3ce5f75861bc978a

  • SHA256

    cbfd5b2c81825040a3d242424b60efe53b2adee712abca526de80776b0dcd076

  • SHA512

    669e64806631481b2848ca8d5460969d1013e3514994ca07610d607a8e33920e5740c2d87d13d4fed83e3a8f37c389bdb2e8a064ab270b380a670661955b2aa8

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXj:bODOw9acifAoc+vA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_59b5effcbe9c81112c1f6588b8876fd2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections