General

  • Target

    2024-06-13_e58d6aee8b9371b116c4cde93b60c86f_cryptolocker

  • Size

    81KB

  • MD5

    e58d6aee8b9371b116c4cde93b60c86f

  • SHA1

    7f23d8e55906a126916e34b7367d8c544e288a62

  • SHA256

    1269c07aa918eb235e71040479fb76ff76a58665a6b2a40e64f3106cc9a5fe56

  • SHA512

    fc308245c2a419d42e2ebdfb8ec750b1c7cef3207fd75b637136f34d6b0f528ead4d4866013e845c1b8d39ae17e917bcf0ec06b7efc321775410a2dd89e74ddb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdo:T6a+rdOOtEvwDpjNt6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_e58d6aee8b9371b116c4cde93b60c86f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections