General

  • Target

    2024-04-19_ee8abb0305bcdfa8b689ce44e13ee4ef_cryptolocker

  • Size

    88KB

  • MD5

    ee8abb0305bcdfa8b689ce44e13ee4ef

  • SHA1

    74f5fe63ebf572699b7d41e7e7c81422f280d32b

  • SHA256

    a0f9e255291670326bf66015419e6522d52ca1bf993c33f41c98ba2203555638

  • SHA512

    7a034fd57335a2dc33b91380b01f857cb7b433e726407584f17b1f5278e56a6deb9704c742ce1572fbaea6b0dacfd2d9288cfb76a8cef707052ed87829edc263

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA3:n6a+1SEOtEvwDpjYYvQd2PQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_ee8abb0305bcdfa8b689ce44e13ee4ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections