General

  • Target

    2024-02-14_eafeb1b0aa887ffadcc047fd7e24e23e_cryptolocker

  • Size

    83KB

  • MD5

    eafeb1b0aa887ffadcc047fd7e24e23e

  • SHA1

    54867a7677723ec92f4bad2e64afed2033410c03

  • SHA256

    87d9664284031e9e6e9221a907d50cb3bb202b84e914582dd9492574d3c33e96

  • SHA512

    12c5a710e432b7983b2604abfc202a186ea5886565b2110e8839bcb56e26a794eab3ae608d1225fe76cdf7acb3e3e8acfe910baf29e8f6b56d401ed015fe8e8b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1s:zCsanOtEvwDpjy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_eafeb1b0aa887ffadcc047fd7e24e23e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections