General

  • Target

    2024-05-14_e4392eb060c7d0c6f603b28a69b111aa_cryptolocker

  • Size

    63KB

  • MD5

    e4392eb060c7d0c6f603b28a69b111aa

  • SHA1

    3d14c61a95542758d53b90481be98b6b25e6938a

  • SHA256

    85fa69cd8319030388df69d7dc0d88af1a9b92a09f335c26ae749164ce0010e2

  • SHA512

    aa7498803178066850bc2dd5ee4aad17f9063a90bb1596dc85ec82d530046779da7d84f538a09e2c48dcc5c4ca49c8cdd9d31c1a18a29fdd05e38fa62a70ee4d

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKi:P8mnK6QFElP6n+gymddpMOtEvwDpjYMh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_e4392eb060c7d0c6f603b28a69b111aa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections