General

  • Target

    2024-03-12_ea45fbeb59c980125e72f91d6ac289ef_cryptolocker

  • Size

    98KB

  • MD5

    ea45fbeb59c980125e72f91d6ac289ef

  • SHA1

    58bec146ac64c93f8e09b2b1f6885952a9b0fa1f

  • SHA256

    52c8b814949b475bb9764e2a72b9b81a0c0aadfd3c1e3fe1e080848a681f94a0

  • SHA512

    94e664c8df854d2f3896a879c91ed306fab6232265f0cdf85ab891788e8c91a0c9b623e79508b97b0b82497a55c606b90df5ba7f9ac26a4c29509d35f960d338

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKia:z6a+CdOOtEvwDpjcG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_ea45fbeb59c980125e72f91d6ac289ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections