General

  • Target

    2024-04-17_e1e6b4e9e9157b943eeb862e47ce9047_cryptolocker

  • Size

    39KB

  • MD5

    e1e6b4e9e9157b943eeb862e47ce9047

  • SHA1

    cca12d2b66c32bb42799ca8161fe9582a16662e5

  • SHA256

    17ee8763e63d25936601060b350d06be9a05ab774c83076204cd8ddfc3921d68

  • SHA512

    e10e6b0f26360b96444c1f3e4d23863b4a14c19c1030aa36d030aed9733842b326ea3e8740849b49ee4c40b8b533978e6329947eaaa3e140449f5409fd0db767

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKH7:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_e1e6b4e9e9157b943eeb862e47ce9047_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections