General

  • Target

    2024-04-23_e87ea8e82b2be3031498f35c7595c201_cryptolocker

  • Size

    57KB

  • MD5

    e87ea8e82b2be3031498f35c7595c201

  • SHA1

    3bb10dd01b00a7d8df800cfc8a56571e6543b776

  • SHA256

    06e2f02b83dcf1831a26c8cbaa70a53e8bd6981606dd9ee92025bba01739521b

  • SHA512

    ea04d0d4664818fbd681d4622c2c990fbaeb9a7aa2ef05b47b733fa8dff596cb717d40e7b42c745b6a986ebef35653407efc1ce572aa34c8c247f1145efb74c5

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPV:H6QFElP6n+gou9cvMOtEvwDpjCpVXs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_e87ea8e82b2be3031498f35c7595c201_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections