General

  • Target

    2024-05-20_ee6381a4d1c579766949b0e815dda851_cryptolocker

  • Size

    73KB

  • MD5

    ee6381a4d1c579766949b0e815dda851

  • SHA1

    12ffdc65a0b04e75448b7399d866eeb7479307d5

  • SHA256

    373099d657515b867ec0fd6ab6bc81c890eb56b147ae9e4929cf0542dd3568af

  • SHA512

    e40a67f8033026cb1652854d0d3162fb098ed58362d60f92305cf2ecbde78cefdea7177daade2728763e4e62c0da99258139d589f17cfc8caae8368cc31dd745

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBReW:z6a+CdOOtEvwDpjQj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_ee6381a4d1c579766949b0e815dda851_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections