General

  • Target

    2024-04-15_e4d9439eea8c1d2ee246d70ce47d39cb_cryptolocker

  • Size

    79KB

  • MD5

    e4d9439eea8c1d2ee246d70ce47d39cb

  • SHA1

    b7c76a7a1f7e11e3c5ead8f1c450196e1fc78153

  • SHA256

    b139ab08e1d058f27182c7220a616da1c23cd301f9e79725ae3e9865298e1c64

  • SHA512

    37cc1b816f1057e61e50edb14d7a9fb5542ac7b6125b4a9896a60a58cd9047a2072f802e0d547c347aa0abfdcd0d11a0de688d342b1ce7f87945eee0df9073c1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qa:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_e4d9439eea8c1d2ee246d70ce47d39cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections