General

  • Target

    2024-03-14_8e112c2a11c7c6999b57aee3710c8861_cryptolocker

  • Size

    82KB

  • MD5

    8e112c2a11c7c6999b57aee3710c8861

  • SHA1

    a6ce2eb103db90de85a72da04dde864037ac579e

  • SHA256

    e29a26efe13a2a9e1fe2cca01d84a6dbefb144464c8002c5a18f62ce5db9eb83

  • SHA512

    0e75417a5431554d0f3cb314d9bf3b320090340d5e6eb27ee7d82ed5cbda405497921e498b02fb6688e1db6305eb1f989085bd81a9002dd187d3a668bbbb6878

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeSb:T6a+rdOOtEvwDpjNtP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_8e112c2a11c7c6999b57aee3710c8861_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections