General

  • Target

    2024-02-13_e7144e45a020e0d89e9cc418175c2408_cryptolocker

  • Size

    106KB

  • MD5

    e7144e45a020e0d89e9cc418175c2408

  • SHA1

    4dafec5eacf46bcbf0fcaf324e4cb8fb5a135092

  • SHA256

    c5e1d760a849f6cb5495f6fa99d419044f70d39f5e8c0b4f68c4d5ed2b2250fa

  • SHA512

    7d47982374aa5a14588b710eb663f4ca7024a406334294397e775522acf34e9f6d713ced7c1c61c687eee08df79a5aff75ca419033e336871add66bbee52a538

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksP:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_e7144e45a020e0d89e9cc418175c2408_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections