General

  • Target

    2024-04-25_e499ccc1d0af842d954344a7af3c1301_cryptolocker

  • Size

    64KB

  • MD5

    e499ccc1d0af842d954344a7af3c1301

  • SHA1

    0593913f67eaae4e0c31758638add47bad1420d5

  • SHA256

    f73aebe8057a008f98d9c041ac5588e65c1147f8b22c618eb5d163f3686d64d1

  • SHA512

    e7ed0779a6066ce47103c75e3feacee18786ccae5eb2a323e88effde61318fd6573c602531c7c9737be144f67cde258bd71b3a27e4d6c47dff409dd8f8030a29

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDi:1nK6a+qdOOtEvwDpjM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_e499ccc1d0af842d954344a7af3c1301_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections