General

  • Target

    2024-06-05_5ef1e3b71ada374cb1a5fdb62a4f321f_cryptolocker

  • Size

    91KB

  • MD5

    5ef1e3b71ada374cb1a5fdb62a4f321f

  • SHA1

    e3833bfe3367dc5737be629bbf4b0df6bdd5a8c9

  • SHA256

    f4dfb1ddb2a99157d487fd7706528a82b1f7194396523edadf585631d4aa55da

  • SHA512

    ff56b9e0ac96fa5ac90902a05d3b53575c84d1a5acd17043def15a72ed26ba00df6bc50a3625af45b4a963c4448c963cfc7fd220b93bd676b40c445769d2d3c8

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/yJ:n6a+1SEOtEvwDpjYYvQd2Pp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_5ef1e3b71ada374cb1a5fdb62a4f321f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections