General

  • Target

    2024-03-12_8e8edc509c032cbe21eac5de42802331_cryptolocker

  • Size

    94KB

  • MD5

    8e8edc509c032cbe21eac5de42802331

  • SHA1

    b1abaa8ee06a41919da6ab835cf989567bddbdc8

  • SHA256

    e9e411a2c64dc2b34ed4fc9b1cb69e623696cee2ca564205b7d6c2fbcb0c9793

  • SHA512

    acfafad0395a82a2944f3a1172d49f23589497f387375b90f66f592aa9edbce8eed8c7bb976187f103f88e44475b62a839e57f8bf8b12501f083e6b760ae6293

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/Tw:zCsanOtEvwDpjBM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_8e8edc509c032cbe21eac5de42802331_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections