General

  • Target

    2024-01-18_4d0b4f0ce10d4f48e1fd93ca2990cd07_cryptolocker

  • Size

    64KB

  • MD5

    4d0b4f0ce10d4f48e1fd93ca2990cd07

  • SHA1

    4e67e8c2ef465096ca4ed8ad219b544f47676345

  • SHA256

    76a9d3f2588e896771b083553028c5fa62c616554a43b6ca302bc8e56092ee39

  • SHA512

    7a7d48f7b8df6a1728269e1a33f1e34fefe03ab20b81620d255262911a59c4f89fea26061283e1092feffff3149ed325affd11cd083d91cf880076828b6c8672

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXS:1nK6a+qdOOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_4d0b4f0ce10d4f48e1fd93ca2990cd07_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections