General

  • Target

    2024-03-27_e24626485ce8fee05d3a47a1809f0889_cryptolocker

  • Size

    94KB

  • MD5

    e24626485ce8fee05d3a47a1809f0889

  • SHA1

    dfd5efc6bcaff6a49342a27ad9135c6ac9537c43

  • SHA256

    e165c4c1e206c6b31fae3adead2e155e1b3770f1e0b4781367d2f7ace0fd7cd8

  • SHA512

    eeda82693d679ee94a620d329de6e7128bec62b4177d7fdfd2b8399c381e19311659f5f057f7a591467b1dff12bd239f07eb071796fd898b0242700acb58da6f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/9s:zCsanOtEvwDpjBa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-27_e24626485ce8fee05d3a47a1809f0889_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections