General

  • Target

    2024-02-28_ed5e4faad80b3a03f098fbca520cf3f0_cryptolocker

  • Size

    57KB

  • MD5

    ed5e4faad80b3a03f098fbca520cf3f0

  • SHA1

    0314920a1e73c5859ae8c199ddc0e0cba4a7419a

  • SHA256

    899c29965e026b09cf8973a2ab0a8a06dc153e87e5f0c8bcbbf6f179b50cb531

  • SHA512

    ef11b67ee718fbc15db8a77aa81d9d723c2cfaf117346d44764dd9e102c462ea25543480ffba55b2004556ddc2103ad6b84469e720bb38e06460dd0ec5bfd923

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpyWR6:zj+soPSMOtEvwDpj4yQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_ed5e4faad80b3a03f098fbca520cf3f0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections