General

  • Target

    2024-03-15_ed1ac9a60986a52bed9886f34e2374aa_cryptolocker

  • Size

    118KB

  • MD5

    ed1ac9a60986a52bed9886f34e2374aa

  • SHA1

    7218af15731408bcf660861f9cf3b0fd1370a696

  • SHA256

    d7f6f4a60e99b7327f81b9aa9bb786898ddcca857f02741bebad4a672d1f2a30

  • SHA512

    17b1d2e213acb4b02eebf2660cc4180db3e74d7331fc75efcfec474bfa55c48580b0b002c45635c701c8e3e47b6eadaea984716f3865a7120bb2726caecdf845

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01ZNr:z6a+CdOOtEvwDpjczd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_ed1ac9a60986a52bed9886f34e2374aa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections