General

  • Target

    2024-02-18_e67a1836af585d19d13cacd922b1a81c_cryptolocker

  • Size

    83KB

  • MD5

    e67a1836af585d19d13cacd922b1a81c

  • SHA1

    d8817298ac7cc19dd8a752b7c31864f94050acfe

  • SHA256

    f734941ea69a34a8149c3e31279d30cf06a1d618ccf882518e127da7182e9480

  • SHA512

    aca80e6a775c7849f6279088b023c31939fa4db3bce831dce604ac665dad275db89f12dc0646baa554a6b89ab2cd0529b18ad030f711c06b5ca6593b44a12731

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7p+:T6a+rdOOtEvwDpjNQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_e67a1836af585d19d13cacd922b1a81c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections