General

  • Target

    2024-02-11_10e0ee6dcf42a774b2fcf835e35090f2_cryptolocker

  • Size

    69KB

  • MD5

    10e0ee6dcf42a774b2fcf835e35090f2

  • SHA1

    b03ae0ccd33b4963bfdcd528d708e57f9beed332

  • SHA256

    3e5dbefaae8417d7a7f341c470d9ac1a8df6b2fc3c6fcea03e96f243d9434331

  • SHA512

    4c6d13c65599b9f2379c65ac7a7fe53b867a56691cbef874cff03f265a0e8ff1f3167b0f3a91aa794971277314886d6902cfd97978ea10858afb728b3d682f77

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBG:z6a+CdOOtEvwDpjQo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_10e0ee6dcf42a774b2fcf835e35090f2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections