General

  • Target

    2024-01-23_e4ca75057fd6a97d601c0358cf9262fb_cryptolocker

  • Size

    50KB

  • MD5

    e4ca75057fd6a97d601c0358cf9262fb

  • SHA1

    0cbdae0fdcff2cfb7fdc58626736ffdf6cc445ff

  • SHA256

    10e0c3fe8d3d74d59f0fdb5178cec1d2476cdd07154ca84cb11a36b2dfcfd759

  • SHA512

    6a8b69094aaf3e2f57978ab67ca33b7332244313b972a4634ab0350c3761ad13306b5720ba7b9f6d4ee744f94f43d8526e0cd09ad46c15e4a767a32d119fa9dd

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0Z36eS:zj+soPSMOtEvwDpj4y0eS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_e4ca75057fd6a97d601c0358cf9262fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections