General

  • Target

    2024-05-20_ef933a00b67dc458da0c55c72e7007fb_cryptolocker

  • Size

    66KB

  • MD5

    ef933a00b67dc458da0c55c72e7007fb

  • SHA1

    0cd756396daaa1d5ade138bda34e8b8db0d008e0

  • SHA256

    cde72501f5aa3879e0bbfc29a2b0e4a20f9ce0cf7a3b351c722593eac4c7dfd0

  • SHA512

    2f5fb06b9d4ae67da9c06074a87ccd13bd70a709a25868f27beabf55b7fc3990c703890970cf870e01c9e50324e0b0a9da233d43053f3fe3faf7c4578391823c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xZ+:1nK6a+qdOOtEvwDpjO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_ef933a00b67dc458da0c55c72e7007fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections