General

  • Target

    2024-01-23_e49042e684957d191ce775b0e47c674c_cryptolocker

  • Size

    106KB

  • MD5

    e49042e684957d191ce775b0e47c674c

  • SHA1

    05920e4c8948735bd962cbb1e7be38f5fd7aa265

  • SHA256

    710b6abc5cc16cbd544af016c2aeed884e7f4ad4ca9da8e40c2fdc3f8aa3ee0a

  • SHA512

    4e1857a122a1f07717fda6daf48aff8c5c170e10194dfc1a9b3333a702a9ca067a9b1a1a3a1087baf839d4ec56b6a43e1c508ccb0d83db6bd2e1455c896fb6ca

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEe:1nK6a+qdOOtEvwDpjM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_e49042e684957d191ce775b0e47c674c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections