General

  • Target

    2024-05-24_ee0f56cf3667246b90925ba66001312f_cryptolocker

  • Size

    53KB

  • MD5

    ee0f56cf3667246b90925ba66001312f

  • SHA1

    c64f82eb33e7fce63d8bf28f2ca810014897787e

  • SHA256

    7524edffd34a38c79b3886bb6ddfda4ccaec8519184bd47677c4d631ac78d700

  • SHA512

    377a648463ce2cd45d3bb60bc1d005698fa3df4fcb61ebf0d9ab23356907918f9f2873d649d6b749bc66bf931d1d06d9fbff112d77af71e012ecb3c4fa652d8c

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOh:bODOw9acifAoc+vW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_ee0f56cf3667246b90925ba66001312f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections