General

  • Target

    2024-04-17_e6e5835db732a5e741254fff54535ce5_cryptolocker

  • Size

    52KB

  • MD5

    e6e5835db732a5e741254fff54535ce5

  • SHA1

    c06777785953ea3d20617800f0ab07f82a11e472

  • SHA256

    8d5d0829ed87ad1667c4771d67b0e4a42fd847769138d942b48d37f24e702022

  • SHA512

    10dd63818e3d860c4bc2af6a7015e1f6cc9f63d65c74fd2e6139724f5cf11c4bb00533f0cce24c54059c9c575808df5ed5304563d09940db2ec8c6fb7969bf81

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOZ:z6QFElP6n+gKmddpMOtEvwDpj31iZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_e6e5835db732a5e741254fff54535ce5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections