General

  • Target

    2024-05-13_efc80d010a490ccf7bc304930db8f214_cryptolocker

  • Size

    97KB

  • MD5

    efc80d010a490ccf7bc304930db8f214

  • SHA1

    588d884fcd8dabb0da3ec2592f2d2c9c31a5091c

  • SHA256

    318e2d890f2b006251c58d0b000c2956ea3c7f8584b2e9fafb7cec44853e7028

  • SHA512

    2867b0899461e735d9a246df1766be80dba4f0c6c73c26ad29ef9d7a247bb4e864484fb809260d94143ce5602dbc9bb41bdc7d0edec3b20e141fbcf89926f9ba

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bq56:zCsanOtEvwDpjBl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_efc80d010a490ccf7bc304930db8f214_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections