General

  • Target

    2024-03-14_0eb6fa75184c5da877d2b38ca33ba950_cryptolocker

  • Size

    110KB

  • MD5

    0eb6fa75184c5da877d2b38ca33ba950

  • SHA1

    cbdf31aaee4b6f99cb228b677336a26632cea622

  • SHA256

    4b238f6b70632f82f0da76ad4f0a4e15cd551cc9c28a18b55dc26658f358c329

  • SHA512

    4cb845d64547f4e5b2a4fbb5dc2f608d0f1afe9b04dc95b49d7bbc3d645870e05387c039f6a31bd85d3394e4a23b20beff7b26a9361226d326ec22c300407b9b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMghJOvja:z6a+CdOOtEvwDpjczL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_0eb6fa75184c5da877d2b38ca33ba950_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections