General

  • Target

    2024-05-10_1eddab6f9102cf933b1ad429e43ba1fb_cryptolocker

  • Size

    61KB

  • MD5

    1eddab6f9102cf933b1ad429e43ba1fb

  • SHA1

    3aa5674bc065c439e1024d188a9391b99919d3fd

  • SHA256

    8258b1e5b809c53f568fb3a7f0807e077e6dabc587fb0fbb351e3e57d4e53927

  • SHA512

    c6cea8ff7d6667684f53bf44701d757350994f1196e8986d34cef693ec89b39dd345b1dee27260895425930ee91278d68a65449b1a8e7df927bae53abd74748a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMhq:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_1eddab6f9102cf933b1ad429e43ba1fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections