General

  • Target

    2024-01-24_939fc99f2c8159c2e1a64952ac9df537_cryptolocker

  • Size

    80KB

  • MD5

    939fc99f2c8159c2e1a64952ac9df537

  • SHA1

    70ec3a5ea77c9be7853b720dd0e505dc3a6dba1b

  • SHA256

    5aa5f237aad32423506c411bad8c6b2fc82a2cac273c3bd0b496c21857827566

  • SHA512

    ae2b582441c5e110a38a7d33d4e89c77ddbfc52692488a556b0b63399224dfb9ae9aab712f1b4487458e5f522537761bd334ea91ad9ce146e91db153a7b7c5c2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBde8:T6a+rdOOtEvwDpjNtx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_939fc99f2c8159c2e1a64952ac9df537_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections