General

  • Target

    2024-03-05_e007c1380e18d42389b6628958da9449_cryptolocker

  • Size

    80KB

  • MD5

    e007c1380e18d42389b6628958da9449

  • SHA1

    80a01ca4f430189207232ebc595c6b1255bee0b9

  • SHA256

    b704f91775143e7fc510a88738d8d8256fb766dc7aa220f19ad5ec141f7df257

  • SHA512

    0a69b1ad81bac11c287563705c67e324a4ae24e9169d1ee43f4d5f855f6df63df313df9f73427bf10c7ffe038860454f711666f829e229e1a93df2ea5feec57f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kySeG:zCsanOtEvwDpjR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_e007c1380e18d42389b6628958da9449_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections