General

  • Target

    2024-06-14_e4801fc34dbaa71f64f0c61b76a0593c_cryptolocker

  • Size

    91KB

  • MD5

    e4801fc34dbaa71f64f0c61b76a0593c

  • SHA1

    24c058b9978a94095aa3fd760c5d48d1d0aca0b5

  • SHA256

    57c25b5bb0b8f8f96b8ad19c7cd6913db333b3d822cee6537cd6bcf7db58a3de

  • SHA512

    80bcf533d99b80d5f92eb6f250a72b42556cb25300b30cd6e3f84e21e209724db7ee672f2f44708447fdb80d4b285b251f4bec7f9aff71cb85638e2282c6a757

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAyK:n6a+1SEOtEvwDpjYYvQd2Pf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_e4801fc34dbaa71f64f0c61b76a0593c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections