General

  • Target

    2024-05-11_e2e1b16279fdbda723aea6e191bc122c_cryptolocker

  • Size

    89KB

  • MD5

    e2e1b16279fdbda723aea6e191bc122c

  • SHA1

    0b9e6ddd120f883b22d5f539c7d5957103f8629b

  • SHA256

    11d044cba0a1f45f0134b21ac1c936c3e26217568a7b7c4bcc4d4d3f72936a31

  • SHA512

    c5cb2a96a3324381b42bc1fd902eb5ff7d708773d306c83b387110808ee1627ff877b898cad148b28a16fa1fcfd2c08f79458b2b093c236313c1a6b86299e97e

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/o:n6a+1SEOtEvwDpjYYvQd2PH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_e2e1b16279fdbda723aea6e191bc122c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections