General

  • Target

    2024-05-10_e38ff9bf52bacb8a830979f29d5da2a2_cryptolocker

  • Size

    86KB

  • MD5

    e38ff9bf52bacb8a830979f29d5da2a2

  • SHA1

    6d6c883b815888f20618b4ee8d104ef0b048b1a8

  • SHA256

    46c2de4533939f6d097a29e74501bfd5a6fde3b8a8e272a4be77abf8696ce759

  • SHA512

    9e97436b719b0af44aa77c26b6e5c67ccd171accd4c95175f8cada973298016201f5e086e2cb38c1061571f1e6dac6df91fe3c915cf4fa0b2a0d0041d4ec356f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rg:T6a+rdOOtEvwDpjN1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_e38ff9bf52bacb8a830979f29d5da2a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections