General

  • Target

    2024-02-11_e1c4deb72f4f10d00af3e2fcc1146e2e_cryptolocker

  • Size

    109KB

  • MD5

    e1c4deb72f4f10d00af3e2fcc1146e2e

  • SHA1

    a7430ec8652a8adbf7eff0c1a2c6d15bf41b9564

  • SHA256

    5f05dd9f8fab58a72f7c7dea74a8fc20b4b19669ea889abe66acbb7f7b2bae58

  • SHA512

    c32e75577faaa360a189ce500521a5fe0ad51373860a3884c3af835d2155b6dbb353134ffa4622c07210b3cf38565032f4de466416f05bb36c6e8c4e8d96ed8a

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMg6L:z6a+CdOOtEvwDpjczo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_e1c4deb72f4f10d00af3e2fcc1146e2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections