General

  • Target

    2024-05-13_1e9a84c7edc546ca3617c1b1e61a29a4_cryptolocker

  • Size

    78KB

  • MD5

    1e9a84c7edc546ca3617c1b1e61a29a4

  • SHA1

    7da09c1c417d1ce26b495da5e95431e2800b525e

  • SHA256

    3c8bb7241bec12f1e28786bb466483c2827e6686e7cd31bd2ff5bfbeb90b8d07

  • SHA512

    d90056b4a754bf8c4d5baeb553fadccf39fa87215477611b4871e0b49f2331ca69f7b74f348ff30c83d26075d0268016217859004f94757099e8eb399d320652

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1H:T6a+rdOOtEvwDpjNtHPc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_1e9a84c7edc546ca3617c1b1e61a29a4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections