General

  • Target

    2024-03-12_e1a1cc4bb04df3174a6cdb3ef211c447_cryptolocker

  • Size

    94KB

  • MD5

    e1a1cc4bb04df3174a6cdb3ef211c447

  • SHA1

    83762b00528930d1571b421c7b46261a88091149

  • SHA256

    021f41b5d8a664ad972fe60f4ea218b0630521fab2e7522a77bfce2a3e396655

  • SHA512

    362d4c4f472fd4d64d0c5878d05f943bcbf31bc90f5de0a25c6454689f488afa56fd04274aecf4e44d0e75a0b8094427108d79306351783eabb90c44cb9f2474

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/o:zCsanOtEvwDpjBo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_e1a1cc4bb04df3174a6cdb3ef211c447_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections