General

  • Target

    2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker

  • Size

    80KB

  • MD5

    5e8970d876b329c4c8368b730721ef0d

  • SHA1

    9bf87266151d55b5ed9d31d7944e39d43c2c8263

  • SHA256

    0e12d43b8dfd0d5cb2c0c55ed6edd6c08c90aca0b444bccf2dbef0c99be44bac

  • SHA512

    d47c1d73445fa72ee61c2f8f8e47e0f8a2766f4307531c944e79dec7452c21ab21b49b7c817029cff5ffef82cb161e5fb4fa4c2f0a54eb84637313d1f6d4752b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd7:T6a+rdOOtEvwDpjNt9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections