General

  • Target

    2024-02-20_e7e0dcca46bf060a4ce8dea7c0bcab94_cryptolocker

  • Size

    75KB

  • MD5

    e7e0dcca46bf060a4ce8dea7c0bcab94

  • SHA1

    62af2cc18057462732e192493a52116423708b87

  • SHA256

    8bbf663f69858c7441294c6416e8df578fcf1e0d3cdbcc34272a155be3cd3011

  • SHA512

    c2d025ee84e4e961252851d54b93c8624279f7ea79f2bae36c71b8dd514f8973d1c6c3711659a9acae69dabd5ab7dc58895a0226ce66a50a43b1de683d9e8699

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcm:T6a+rdOOtEvwDpjNtJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_e7e0dcca46bf060a4ce8dea7c0bcab94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections