General

  • Target

    2024-02-02_6d4a5454edab94f94149d015339273cc_cryptolocker

  • Size

    116KB

  • MD5

    6d4a5454edab94f94149d015339273cc

  • SHA1

    be526c91a27811e59abb592b246c2eb472047e2c

  • SHA256

    24eeb6aae2a55cc0b440ae9bc5c239f33a952de5a4d163e963435e829bfab777

  • SHA512

    2362a635ff48f7268dde60abf9d176ab7de1df61d7570aa9a20c2157cf2a34d8752946f6620172a6dd517c97e499ef7edd88ccd6ae9106c6e63b3abe0cdac026

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01b:z6a+CdOOtEvwDpjczZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_6d4a5454edab94f94149d015339273cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections