General

  • Target

    2024-06-11_e53902bce11ee80d711527b244948a86_cryptolocker

  • Size

    64KB

  • MD5

    e53902bce11ee80d711527b244948a86

  • SHA1

    ed790bda020c74307c96af82febe738477c7ba5b

  • SHA256

    e9f3a62ff011e7bf18aa2ab97e8f0a5c23ad5d8890d0bf9b865d699738bf8d0a

  • SHA512

    c33584f74c3b7ca16a160b1124ba33bf3f482ed19be72acc7722bd5e2aae1c74f2bc78782380b7637846e23678e5b155d286a999838fed010beccce0f40c789f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYMWRIh:1nK6a+qdOOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_e53902bce11ee80d711527b244948a86_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections