General

  • Target

    2024-05-21_ec7f232e89293aac5eb71b5beaea6ff2_cryptolocker

  • Size

    94KB

  • MD5

    ec7f232e89293aac5eb71b5beaea6ff2

  • SHA1

    12f4cde782250b198254b6e5200126eebc6978d2

  • SHA256

    3b520275f6fa6ebbce5c7fb34075573be4d5b3f3b58380d1d0acc3bf924e542f

  • SHA512

    586af8e5eaeefdd6314105607624a8b39c2a20d4b91522488a1626529ac1dd214d3a8f563e88707f5978ae1a3df817f792c10d6fbfacd86fa34bf32810ed070e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kr:zCsanOtEvwDpjBg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_ec7f232e89293aac5eb71b5beaea6ff2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections