General

  • Target

    2024-04-23_e1a1f0e31ba62f447b2f629e88a3caea_cryptolocker

  • Size

    67KB

  • MD5

    e1a1f0e31ba62f447b2f629e88a3caea

  • SHA1

    ef0a613d1a942d8d0a310e81b56db8a79b6ca539

  • SHA256

    827d70b7276a7885d14c92944deee794fc9fe173b3a6e76a0be83c35fb77bd4c

  • SHA512

    a0e628b052fa4beba4d068c4d2eec458aedd67fa728e7206508b022e550e39900f2d50388036814fd6d859be58e9c60cc54ba1948ad6aaba01a589ec6fc4e39a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRh/:1nK6a+qdOOtEvwDpjc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_e1a1f0e31ba62f447b2f629e88a3caea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections