General

  • Target

    2024-03-11_e42d40d6b3d32c16f23c06afc602c953_cryptolocker

  • Size

    61KB

  • MD5

    e42d40d6b3d32c16f23c06afc602c953

  • SHA1

    fd854d44be23cb73dea2649316cf931a9eb8ef07

  • SHA256

    70020d02cb2a3556ca5010f370b8f14f206bb6796a6b670a48a87c6f3a2758a6

  • SHA512

    ab5d28fc4a1aabf4af91ad6264585d7bdc3cd93b3e83b680dd7f17639db54a166e9dcd08d2e3ec9517c12048df740c1b7c363b2a9865079a1ea68ecc0f120987

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J59H:T6QFElP6n+gxmddpMOtEvwDpjwa39H

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_e42d40d6b3d32c16f23c06afc602c953_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections