General

  • Target

    2024-04-30_e52b1ad3536f9f0b1dec7e909b1d19c1_cryptolocker

  • Size

    89KB

  • MD5

    e52b1ad3536f9f0b1dec7e909b1d19c1

  • SHA1

    53e727ec3bf552c8796330689806976b70b84fb5

  • SHA256

    07ce3c2d7bd9aee2133c53bfd235684102f8ea0375ee11867e4da281a0150906

  • SHA512

    fe16a94d29de94bac64119dc8f39bfbbd214f68f4c8e1e1664382b465b1a69aa1d1209972648dcd82d639995c1440fc797d652f5e197ac30feb55bc9bd276b81

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAm:n6a+1SEOtEvwDpjYYvQd2Pm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_e52b1ad3536f9f0b1dec7e909b1d19c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections