General

  • Target

    2024-06-14_e3029987d628f48a2f414e61eef9c6a8_cryptolocker

  • Size

    76KB

  • MD5

    e3029987d628f48a2f414e61eef9c6a8

  • SHA1

    8478a108d82a2a6b7ac2a551bf9bb61f4c67566e

  • SHA256

    16d0202b8215c85d4b75d017c236f76397294478227508d66d3e03887c280acc

  • SHA512

    c16609b476c9b14efab22bd5281b1d00790e4687d113c90581245bfe76b82dea883e35d113ae3ad8e48064b6c57f209781dbabe3261dc599eecf6e5ff55731e2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gz:1nK6a+qdOOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_e3029987d628f48a2f414e61eef9c6a8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections