General

  • Target

    2024-04-05_ea0a9d70ae8be7c1803f726da053d817_cryptolocker

  • Size

    82KB

  • MD5

    ea0a9d70ae8be7c1803f726da053d817

  • SHA1

    81954ecb44d6382e27c64947ab19193848ad55ca

  • SHA256

    ed7eb24c2b108202e0efb215b26cb0bf2a5e32318196f249d2c3a4dfe95d4831

  • SHA512

    8596cd81827f957bb6b9660435a4401216951befbb1843bd7b481fbcce8d23e7b4aadd8a9bf7460b696c7eeca78397765b2392c1b24f2277b76f3d935ba76572

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT76B:T6a+rdOOtEvwDpjNu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_ea0a9d70ae8be7c1803f726da053d817_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections