General

  • Target

    2024-05-04_e5737cd819188c04e1194e215195e678_cryptolocker

  • Size

    64KB

  • MD5

    e5737cd819188c04e1194e215195e678

  • SHA1

    3cfa89048eae211f6f8f504b14e57dc24503c2d9

  • SHA256

    5c090e09a02c8c74f913a2a403d4229742834b2bbdca551428ee0946d9529ffa

  • SHA512

    18729d717f176d173b206bd3f664aa6c8326b76b47172f3807dd6ca1a429349ffb9f2afc6487c058a7a16c8f1b6802eaea8cf60d7cd9a2b2119f36e2d6feafba

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDwS:1nK6a+qdOOtEvwDpjR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_e5737cd819188c04e1194e215195e678_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections