General

  • Target

    2024-02-11_e45d6d1e7345f0353a39ed757b17930e_cryptolocker

  • Size

    82KB

  • MD5

    e45d6d1e7345f0353a39ed757b17930e

  • SHA1

    5d7d9b8d740693592dc26c597cb2142ba8a6733c

  • SHA256

    6627a2e51d1c2995701fbb34acc82e2305d716c7f604a052ee7b5e0aa0b4b239

  • SHA512

    379816821de8cfd24a0628d5139a64291e114074d4a9bbba1c83fad26ddd956894e79da94f7e1b293a874750f87bd342086d50fbd8e9946a2e197c5b07c39700

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1nQ:zCsanOtEvwDpj2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_e45d6d1e7345f0353a39ed757b17930e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections