General

  • Target

    2024-02-28_ee45f2a26c53a6e37df743900f391fef_cryptolocker

  • Size

    81KB

  • MD5

    ee45f2a26c53a6e37df743900f391fef

  • SHA1

    08b0f04eb9a42dfc1a516b729dbeb00e1a039f9c

  • SHA256

    a2f2e3ead5f1966ce3f243a80bfdf6a66f71fbd5c6f124667026d30d0d8b8ea5

  • SHA512

    c2cfdbe844db9044277a0708e6d9ad653fc0cab1729203ee624f324820dad5416ab8551a9e943329e8e95217a228cef6299a25089acba040b07909b5022c7f05

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeSI:T6a+rdOOtEvwDpjNt8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_ee45f2a26c53a6e37df743900f391fef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections