General

  • Target

    2024-02-11_2ea4aab394a83d14536e2ae3d1a4b003_cryptolocker

  • Size

    79KB

  • MD5

    2ea4aab394a83d14536e2ae3d1a4b003

  • SHA1

    ae41fa61eb538f7670dec4c0575e308cef616750

  • SHA256

    d4b01654697626f5452f11fd051733d683d51da83e29d616293297e561011ed8

  • SHA512

    96a492fff3a532e7b65419f5b17f2083a35129c9ff66552019dd5276adf84fef77c5c0fa1d4fd4b07d5bbdb2f7e518825fb806c851a95cd2c36621ba512a1624

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0bA:T6a+rdOOtEvwDpjNtj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_2ea4aab394a83d14536e2ae3d1a4b003_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections