General

  • Target

    2024-02-19_e711bf4d9eaf4bbefb3a1f9578b98115_cryptolocker

  • Size

    66KB

  • MD5

    e711bf4d9eaf4bbefb3a1f9578b98115

  • SHA1

    64e6e1d8a072ea3fc896764480c4f393b0921e60

  • SHA256

    040d8c7e065c9ddc4b4b990ed7299891ad2cd083792b1e2482754205a2b576e7

  • SHA512

    f925de40918953af42f7cec1e6bb834197c21a5a0e593bcb9b051969b821bb426db1acd74b1508c5cc24153c37425bb5382541707a058c9d259c2a8d93523666

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1F/:T6a+rdOOtEvwDpjNf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_e711bf4d9eaf4bbefb3a1f9578b98115_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections