General

  • Target

    2024-03-12_eb8df0b24bd1a89b5cdebe066ec28e22_cryptolocker

  • Size

    80KB

  • MD5

    eb8df0b24bd1a89b5cdebe066ec28e22

  • SHA1

    4a87c6dffd63f8aa2d0b0eb44498643ade4844a8

  • SHA256

    91a1926b79b23e1d08e660fe69999ab9463149fe3e8003d166c8b408d09c4dac

  • SHA512

    adb8c7ba26f702b65a245c1fa9a5c83e9ea2ef1c417aea5fd0dfee9b7df14d1aa43895b3cc0cd6a73978c3bca4c1173465382f00342f00d1602d904828c42726

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kySeM:zCsanOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_eb8df0b24bd1a89b5cdebe066ec28e22_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections