General

  • Target

    2024-01-23_f0c48f117bee6e42c52b84ad730782cb_cryptolocker

  • Size

    64KB

  • MD5

    f0c48f117bee6e42c52b84ad730782cb

  • SHA1

    1f8dc988075610a604722eaf2a18e4b5b82e5eca

  • SHA256

    52378ec123f363254fc960a91e427c2eb852b4ddd7ff72082cd2f5703f7c746f

  • SHA512

    be386b95c98859adc9eeb836f26702a8db3a19952536dc87ebcba1bc952b3b33d0ab85b0d44f13dcd492bdde3db4c9de82f4ce506f59480e44b683267f596120

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+g0hum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+g0smddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_f0c48f117bee6e42c52b84ad730782cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections