General

  • Target

    2024-01-24_ed53a1960bcc348cfd00813024cb1411_cryptolocker

  • Size

    91KB

  • MD5

    ed53a1960bcc348cfd00813024cb1411

  • SHA1

    847aefca53944a6e2b6b84da131ab2f3aaa2a6ed

  • SHA256

    5e685ed690c2e17849bd7ff5295b23ab7d2f0b555eacd376aaa688aef4b379c8

  • SHA512

    9873bed6624127a3ea0407794783d2d6d4aae0b8cfdfd28c247efcc79570cd35edb3c8d0ad2a59f7f5109e2dee4880b1e70be5d7a89a75ad2989b635912d5267

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/K:zCsanOtEvwDpjBK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_ed53a1960bcc348cfd00813024cb1411_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections