General

  • Target

    2024-05-10_e2a1ec204ffaf3c9050d74ff4539c339_cryptolocker

  • Size

    51KB

  • MD5

    e2a1ec204ffaf3c9050d74ff4539c339

  • SHA1

    76f8fdaa7c129438cadbfc9a4f2f88629f9122d5

  • SHA256

    a6ddbd37c1b6c6db6b962121e04a501e72735606e7cbc45c3a59c79c7fc5111e

  • SHA512

    c3b144634b0311b834f15d5b3ba330cbac5c42339fa58a9a3d89514a1c8f6fa75fcc4089b155aee25f3da5be3edfb4375a89e2a15935ebf0e2933c38e064b1a6

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOZ:bODOw9acifAoc+vW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_e2a1ec204ffaf3c9050d74ff4539c339_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections