General

  • Target

    2024-02-28_e9f48a8369f5022b88eab714ab582771_cryptolocker

  • Size

    98KB

  • MD5

    e9f48a8369f5022b88eab714ab582771

  • SHA1

    c0c251b8eb937e9292dcad0cd513e3bfa2276543

  • SHA256

    58abb6779c647648e35d7f2c0484cd9ac7168a81b1e6044d4e7a9e5d73a0ad20

  • SHA512

    3d15e4b8f0b60b0146b807841bf25afe0028e89821c191113b2e13c9e9797d3c709870ad8ab688f66142a52929224a884c3c1abac385ab5f9e1b04594c776538

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXY:z6a+CdOOtEvwDpjc8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_e9f48a8369f5022b88eab714ab582771_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections