General

  • Target

    2024-02-22_e2440b2b4c841b84fb9ed348bcd903bf_cryptolocker

  • Size

    97KB

  • MD5

    e2440b2b4c841b84fb9ed348bcd903bf

  • SHA1

    f0349a4b48a5784b23e449a6e546238ea57853d7

  • SHA256

    a6b79c52f54357bb6d422719a7cb5bcabc362b650575b4965a8c7913dc707cee

  • SHA512

    103ef2320dac628327dea59ca8ea70f90b0bf99aac6d2b12464e3e0ee9c3a437959b4dc1bec55fab1230f5a66fe05da753aff14b9664c7f62296722c8fd96092

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiK:z6a+CdOOtEvwDpjcm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_e2440b2b4c841b84fb9ed348bcd903bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections