General

  • Target

    2024-04-10_ec7ca9c46db6ecafa936cb5730e8aa69_cryptolocker

  • Size

    59KB

  • MD5

    ec7ca9c46db6ecafa936cb5730e8aa69

  • SHA1

    ace6ec26ed35e33fcc1ab4e1ff6fae53a268aef1

  • SHA256

    b2768214a74684cfe54bbc630e4062a174cf96412331d70dda99ddaea76ddefc

  • SHA512

    24087713764f58e8eb1c664d0941e12153be31222300284311456716d768222b4c7c6219011f68044645c49ab8468e52054c9c83f2b71d44e4d32f38860360f2

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnymb:zj+soPSMOtEvwDpj4yRymb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_ec7ca9c46db6ecafa936cb5730e8aa69_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections