General

  • Target

    2024-04-05_e0ed45a8096d4b59e2138ebdd8b7d3d7_cryptolocker

  • Size

    73KB

  • MD5

    e0ed45a8096d4b59e2138ebdd8b7d3d7

  • SHA1

    727d92dd11bee1007d19e0ebf0c1f96cc30fcdae

  • SHA256

    33179cfd602eb9bacdf32657fc3e8ae7466a5b381b39869d1522bfb96056a3b5

  • SHA512

    743c8e3835e09cfc2b305ca80d5caa29e3bf571caf8d8ec7d195c871621486fd3240ada8a2a75065a8c0a00f5381ff6ecd5113449fe72a6d0bccb225fb56a2e2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gon:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_e0ed45a8096d4b59e2138ebdd8b7d3d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections