General

  • Target

    2024-05-13_e3bf02db155e6a5a79200c760109999c_cryptolocker

  • Size

    78KB

  • MD5

    e3bf02db155e6a5a79200c760109999c

  • SHA1

    8f74699dcf23ea14946c968f8eb6da10b7c255af

  • SHA256

    6fba927bed5b6abd3b0dc9733eb6545d7ec436bdbf194d82e139f6fc067e1b4c

  • SHA512

    072090dfbf9aaa84f98620640d344aab4bd933af26a8a9f4a5aa66f18ab9c4d18113c895212d6321866b611149ca5900bc4687ab92d01d35ce30ad69e681ca53

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1m:T6a+rdOOtEvwDpjNtHPR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_e3bf02db155e6a5a79200c760109999c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections