General

  • Target

    2024-04-18_e7dbdfb0a54b47eae9b628c555bf3ad9_cryptolocker

  • Size

    51KB

  • MD5

    e7dbdfb0a54b47eae9b628c555bf3ad9

  • SHA1

    140e0a99d128ee70f0760cceb960013286246abd

  • SHA256

    82ba95069291506217dcab17ab2eb4d78ee0e3d52dca0109cf11aa137cf1ba5a

  • SHA512

    7815ed4f030e00cd5d5f8b69a2e4b36d5d9550acd389312b57c5080a5844da1b82de23769feb3fed0895d313b4d417aace6fa75ae63e4a81fa63608c8de1eb2f

  • SSDEEP

    1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQ05W:m4Q2ckzIOtEvwDpj4HYe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_e7dbdfb0a54b47eae9b628c555bf3ad9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections