General

  • Target

    2024-04-29_e7813b41c894e1c6fe9288d7fc3fe0b4_cryptolocker

  • Size

    89KB

  • MD5

    e7813b41c894e1c6fe9288d7fc3fe0b4

  • SHA1

    a73e2085932744a924b9e79a29dbd9a2c40e296c

  • SHA256

    078e63b450eb96647491c914e3eb7562b7183248326429d28a168a80a24294f8

  • SHA512

    b0918cecc8c86565ee89b28f9b00e6c61ac94f31f1c8013ade89eecb3785e0c88ea099a67dc0265490051b07fb5046f43015dbcd2453f5158417de924a76031a

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAb:n6a+1SEOtEvwDpjYYvQd2Pb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_e7813b41c894e1c6fe9288d7fc3fe0b4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections