General

  • Target

    2024-04-19_e7f82d4e0a1ec2f0d9b624dc768de982_cryptolocker

  • Size

    78KB

  • MD5

    e7f82d4e0a1ec2f0d9b624dc768de982

  • SHA1

    1920d110f9c4c32c73b98a99176fde48c4a7c099

  • SHA256

    e1f5154d7118c5b2babb230263a1766ca6a3dc59e77349fd36633e5cd55a2ddb

  • SHA512

    49184e9155db9ffb952abd80c9eacf14e9e65e91650fd25caee8596f1c287febf9d5ad23120ef3367c12e01b89dc288d023ba1189baeef776db17e4dd98b600a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqz:T6a+rdOOtEvwDpjNcg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_e7f82d4e0a1ec2f0d9b624dc768de982_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections