General

  • Target

    2024-02-13_e210773e0c85c3a10cb5b7776dda0a7b_cryptolocker

  • Size

    82KB

  • MD5

    e210773e0c85c3a10cb5b7776dda0a7b

  • SHA1

    c7813c0bc2590d9abd76dc0244378cd34e096eb4

  • SHA256

    b5540db41de52d0cb025da1215817eec26078584db6ffceeb5c16c8a3d8bd540

  • SHA512

    6716780b61900a40da8c7d1212a96ce55b8c83b1a4bbef981f345dd723b963833cd521f4b2569fffd3c36d70839a3916c3a4a517873e90a5e3efa2dde1e174c3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vm:T6a+rdOOtEvwDpjN6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_e210773e0c85c3a10cb5b7776dda0a7b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections