General

  • Target

    2024-04-20_eb6a0cf4d5445370ca816e5d0e435f71_cryptolocker

  • Size

    76KB

  • MD5

    eb6a0cf4d5445370ca816e5d0e435f71

  • SHA1

    551686dd84829d7838908216d69630d9ed9ef52c

  • SHA256

    af390c293ae185049194008e8a7fb2c12eddb781b34e2e68e4e94b8e191eea05

  • SHA512

    2aa4f12b8ad8a5089157ea10a7e1f694993146fcaa90eb1dd03dee9daf5ad94ceb9578901280100d4df99fcf403a77f3c0f8da3f0e8fed761c7cd8d97a8020ea

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxk:T6a+rdOOtEvwDpjNtHPT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_eb6a0cf4d5445370ca816e5d0e435f71_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections