General

  • Target

    2024-06-06_e169d218db91273d36af1960aaf9030d_cryptolocker

  • Size

    41KB

  • MD5

    e169d218db91273d36af1960aaf9030d

  • SHA1

    00ea9bf423f114b251b0d55d5f68623446f35018

  • SHA256

    9b0808be257bab6ea3a5406bb7983b2777a35214ecf5d692a012ea5c8daa2a39

  • SHA512

    fb4ac56b5d897b2a47a76672c29115d2bffa453adacd5400220562d99775f58cb99346f67e528d2fabe6a44fce72ab828f825c88c7f589a68e1bd10bfaa493b3

  • SSDEEP

    768:q0mnjFom/kLyMro2GtOOtEvwDpjeXOQ69zbjlAAX5e9zs:q0mnpomddpMOtEvwDpjeizbR9Xwzs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-06-06_e169d218db91273d36af1960aaf9030d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections