General

  • Target

    2024-04-06_ee60fa810e363059caaec80aa1bc5129_cryptolocker

  • Size

    93KB

  • MD5

    ee60fa810e363059caaec80aa1bc5129

  • SHA1

    08b284c7a5cf4beee07b6a853148409becf72635

  • SHA256

    4c70c1aa1a209126df530ca883c027c5ef58a056a055038d644fa62709e054f8

  • SHA512

    af0b2207e1e90ba6660b3b7b3ac61fedd3482317c78feba14732b00b5e222a52f77e5d051102b234f942a25ec98f41017c27f2c9b95ee8ff212c00f01ffecc7e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/5L:zCsanOtEvwDpjB1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-06_ee60fa810e363059caaec80aa1bc5129_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections