General

  • Target

    2024-05-23_e923d519b0029bb44ab8bc4db1bcd607_cryptolocker

  • Size

    59KB

  • MD5

    e923d519b0029bb44ab8bc4db1bcd607

  • SHA1

    9e45b118019392d104d0941992889d95576a6740

  • SHA256

    1b11355add6b34e8faf4b0bf4f6c3101e6976f4b7ec85b928ddbce121220f65c

  • SHA512

    887fcdb23be7267457e84d595630c61effedb1566c89830852d12d20aeef5708d8ccc5bbc8e70fe4944a281988c53192ea0dabd1226b85041b32826cbd9d3327

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6p5:H6QFElP6n+gou9cvMOtEvwDpjCpVXH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_e923d519b0029bb44ab8bc4db1bcd607_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections