General

  • Target

    2024-04-24_eab11fb4ffd6d5103c9d737edc1b2ac6_cryptolocker

  • Size

    80KB

  • MD5

    eab11fb4ffd6d5103c9d737edc1b2ac6

  • SHA1

    5810ab97814db18bc8477096c5afc64760a71cae

  • SHA256

    4b0bd513b61e3bf7c477b5d481e5c2389fff059a7cea606bbe070adca3d3f078

  • SHA512

    936420468b9f72e8c6cd51799b640074df7487899a3e30c577de521ebbb861b9c3b55f5253d6c6a8fd8d20ff4402f25f1e0f50a5eedd6a9edd9ae84e76d4f794

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Q1:zCsanOtEvwDpjh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_eab11fb4ffd6d5103c9d737edc1b2ac6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections