General

  • Target

    2024-05-27_e1b0845bb4d68d959f4ee79c6fa89a03_cryptolocker

  • Size

    94KB

  • MD5

    e1b0845bb4d68d959f4ee79c6fa89a03

  • SHA1

    ce6f6e978ec7e3069e7033131b421afcb71b607c

  • SHA256

    8a2581e856a668c09e3b319640e8d9d86235421441753a323a18dd297d07effb

  • SHA512

    6ebd7376fc1976eea61fed7afe1851695ab06ebc2c4589cb54cdbcc46438db65f8abcf9749b6c869ffad489cfd724fdeae29bc05ceb102d574b0fc86b2c0b92f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kl:zCsanOtEvwDpjBC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-27_e1b0845bb4d68d959f4ee79c6fa89a03_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections