General

  • Target

    2024-02-23_e563e58ae5a3c6852b109b14c292ff82_cryptolocker

  • Size

    105KB

  • MD5

    e563e58ae5a3c6852b109b14c292ff82

  • SHA1

    d01eb804f4b3c4b018ed9a9918683f53c6004f9d

  • SHA256

    e31a0c33d004eebfca18ea7c0734c14b7ad5f8d26ab0d052d1d85bcbbfef798a

  • SHA512

    52b2e954b3707548ef32e6c5ef0674363edeb734a5d198723a528e06eee8f335b7ccb1553d060a9c5537488e764bcfe61b0bc34c675bc73951edac5414e774fc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksP:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_e563e58ae5a3c6852b109b14c292ff82_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections