General

  • Target

    2024-04-24_e882214531b08c9de210893956ed7b5f_cryptolocker

  • Size

    89KB

  • MD5

    e882214531b08c9de210893956ed7b5f

  • SHA1

    113bf18bd303672ac7b20edde7a3b951545ac328

  • SHA256

    1762013807444fd52724e1e4404fec7c44af2b6ffabe442ce9c3ef3f97ea9e9c

  • SHA512

    ea86fe128b18d82c432235dc7e802984a8302920c45c46c12186e806340d6c7a8b1fbdcbc50fe1d742ae5a0138b1de36f23f7cae05810aa9912262caeb160c21

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQA3:H6a+uSEOtEvwDpjrYvQd2P3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_e882214531b08c9de210893956ed7b5f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections