General

  • Target

    2024-05-17_e092d2e9442ff13c808bb7bffa853cf2_cryptolocker

  • Size

    79KB

  • MD5

    e092d2e9442ff13c808bb7bffa853cf2

  • SHA1

    b74eac5886a6f4db17e819897b2bc009aa43bbea

  • SHA256

    81d0c148006c354d3364f7d779e8068c8d2079a83b20e5b4e611e43e844f46cd

  • SHA512

    4dc6646f930be79dad5c3ad40a0202cf488896fd753c9fe82865ca0b520d04b4ace4a46cdb0752f4a6a4a16f56b25191e0c08171e699fd241adf2cf1788b5fef

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1w:T6a+rdOOtEvwDpjNtHPz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_e092d2e9442ff13c808bb7bffa853cf2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections