General

  • Target

    2024-04-17_e76d0e73c681b23cd128fe6bacd3e1af_cryptolocker

  • Size

    78KB

  • MD5

    e76d0e73c681b23cd128fe6bacd3e1af

  • SHA1

    2236f4a60cdfb469f50ee506f29e34115c1067ec

  • SHA256

    3a33e8d693727a7aa28e47508f60f6208b5005a83fa4141ba9d199cfc3dc5a22

  • SHA512

    3542a3a93c455c29e508aab83ae58a00f2712096e2fa9e11bb1121e58ea0d0fca5e87a6499fd6de775398c6af5cf3c4ed45774d773190daa40634992b7c98663

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqc:T6a+rdOOtEvwDpjNcH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_e76d0e73c681b23cd128fe6bacd3e1af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections