General

  • Target

    2024-02-11_ee903bc309fbfaeb534fe1ced55100ce_cryptolocker

  • Size

    80KB

  • MD5

    ee903bc309fbfaeb534fe1ced55100ce

  • SHA1

    03407e430d1e65f2c40c1cfab0d23a0d9dd1f80a

  • SHA256

    ce4e6ca25a4f457e42ddaebb2521cad4ae030a045063c5a7b3506450dc6ca218

  • SHA512

    6d506f9d973434370e0676519b76ef07a5f85fd98073e12d9faf39d5ab4d3e0a2b291fcf391f027f75be71d7a65fb6d72f213f643c8855759d901888306f8a94

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2y:zCsanOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_ee903bc309fbfaeb534fe1ced55100ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections