General

  • Target

    2024-02-29_e411ddf6efffcfd386f5b3ac0c3657fc_cryptolocker

  • Size

    78KB

  • MD5

    e411ddf6efffcfd386f5b3ac0c3657fc

  • SHA1

    30b2ad48a098f50284d945f4a1844edeaa8fb8ac

  • SHA256

    596de708ddce5b1b4864dc41c44e9f49cfbb8604f2f47a1afb2e39cc22f6031c

  • SHA512

    cbb5531fa9e2657e162d21c972905a8b3562b944b78109dedb012ba44d165854630faac148fe8e4154e2e04f846eb5a7448146f59a3997dedb6a08c60fab13ea

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QpS:zCsanOtEvwDpjM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_e411ddf6efffcfd386f5b3ac0c3657fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections