General

  • Target

    2024-05-30_e416a540e1978cf43fac34eaac7a9dee_cryptolocker

  • Size

    75KB

  • MD5

    e416a540e1978cf43fac34eaac7a9dee

  • SHA1

    27130e58398eb5268fec288d8d78a352e7411ba3

  • SHA256

    a73cf97eb31d17b38752ea14d4e688cef9c345ba3f419e0406437461c253296f

  • SHA512

    59560bef15bac36c4216f0521903ede7fd76523585a68de056a2cf3eece0d7a748a5d2421f644e2d1c8a44bf16fda3a1159f84b94947f26032827289562e3c95

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81GT:1nK6a+qdOOtEvwDpjy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_e416a540e1978cf43fac34eaac7a9dee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections