General

  • Target

    2024-05-10_a70e4409eba0ebd8b8fcd4cee122a92e_cryptolocker

  • Size

    89KB

  • MD5

    a70e4409eba0ebd8b8fcd4cee122a92e

  • SHA1

    e55532514bc35536587500c0ade0ff56b5d6228d

  • SHA256

    d929784b5cb0a8a11868e8b77b4f610e3d2aa9a6087f9e38fc01a06136b8808f

  • SHA512

    ea45a1983da1df481b741ee42d13a3b5c3b20b5430932cb996710c85e4f81f2fcf41ed545cf8b35bf3e51eb76d475a8e1d5904f152d6d7c2679c3b5ada2ccd71

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/u:n6a+1SEOtEvwDpjYYvQd2P9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_a70e4409eba0ebd8b8fcd4cee122a92e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections