General

  • Target

    2024-05-23_efb960b64d171346b60191e0f054da50_cryptolocker

  • Size

    95KB

  • MD5

    efb960b64d171346b60191e0f054da50

  • SHA1

    18e04ad6ddec679299641f07ee8e9d3b665e915a

  • SHA256

    0ae2e9387ea16c8a06f8d47ab4e14a0ce1a52b4fde141ebcf2e8e5b9b54efbdc

  • SHA512

    000da2f5efa2fae22a162c7990831ed98cad155fd6ef021ea03fd91c1ed639b1a8cb47d4ebacd3105095074b234569a29d1f05e5bcd6a6da5ff270e67bb1302f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kb:zCsanOtEvwDpjBg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_efb960b64d171346b60191e0f054da50_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections