General

  • Target

    2024-04-27_ebfea2e38f83ffc5e437a311f831a7b6_cryptolocker

  • Size

    96KB

  • MD5

    ebfea2e38f83ffc5e437a311f831a7b6

  • SHA1

    214464d0c4ba7626dab128f1b4ea5bf3b9c4dafd

  • SHA256

    679922e1285fb13b0d92e2207ee2a58e59eb60bd56984ac94f38c21e8a6298b7

  • SHA512

    30cbac2804d160f5ed95a23eae52c7d420c1b43eb65e762aa1dcdb370655fd140e8ab6d5db81da6b66ebdfccbabfbf47767499f48791073307d8edea6e0ef32f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/b1:zCsanOtEvwDpjBh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_ebfea2e38f83ffc5e437a311f831a7b6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections