General

  • Target

    2024-02-18_a0e7e4baeafe3162d733cfb4a83b7685_cryptolocker

  • Size

    55KB

  • MD5

    a0e7e4baeafe3162d733cfb4a83b7685

  • SHA1

    02eab5b04255573b3fcf8234db0a2f19c03243b0

  • SHA256

    ec497a576dfff8420e6d1b9d9ed6ddb352b90e4dbe5d390ed46767ed046c6b55

  • SHA512

    53e86d665c40a410151f590750f0ca058874df8213dab180cce5d513e86b3bc670ba7c499b3b7273be513f83fb271a34d8e026a50e756e00f70d19de2c13bd99

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axc0:z6QFElP6n+gKmddpMOtEvwDpj9aYaB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_a0e7e4baeafe3162d733cfb4a83b7685_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections