General

  • Target

    2024-05-29_e0e7a03485f2282b5a87408237ad8d6d_cryptolocker

  • Size

    78KB

  • MD5

    e0e7a03485f2282b5a87408237ad8d6d

  • SHA1

    ee1810155660b7c8cb359217d3b7dd250951bc8e

  • SHA256

    c8f8ff42440fba58a4453bba36a7548d2fc5acdf4460f4c1bbfaaed130b357bf

  • SHA512

    d6442476bef708027ca3b9ef7dfbce10ad1bafc28cd82f235181972a9dacba78bf6d0169608c612132f5447a76e26f7e6963644327830c735a8046558e8cb37d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxn5:T6a+rdOOtEvwDpjNtHPK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_e0e7a03485f2282b5a87408237ad8d6d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections