General

  • Target

    2024-04-27_ee11b9ac6b7aec6b8b7aa543fd1d1053_cryptolocker

  • Size

    80KB

  • MD5

    ee11b9ac6b7aec6b8b7aa543fd1d1053

  • SHA1

    625ee1b58d91f5d673bc1bcc4f046d3581cdc269

  • SHA256

    38ff684ac3f9a76450ed97d2d1aa89aeebbcef78376b983a8c91c007670f7db6

  • SHA512

    a3e9c313d595699d8adb978ab65a2590093c9e62813af103e833cd1b5b2cdb749385dafcac8972cfa446209e7ec353d69e5f55d656ea63cc9b9b4c0618308722

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd+:T6a+rdOOtEvwDpjNtk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_ee11b9ac6b7aec6b8b7aa543fd1d1053_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections