General

  • Target

    2024-02-02_707039f19bb10015c36e99850c6ced66_cryptolocker

  • Size

    104KB

  • MD5

    707039f19bb10015c36e99850c6ced66

  • SHA1

    8adf5e1b6d575e90d14e2471a75a7b9f2e4bef7d

  • SHA256

    4fc9c6a62059d96450661a587386dc147b7ff4044cabdeaefa5e2c7936dd286c

  • SHA512

    92de070894f433ad5e9e84731308f2422775e6b2060faaf327ab160f098eff8483f0293fc06061395a1e8305849b8c0c6001415f84c9555a3f6940a9324581d2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksu9:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_707039f19bb10015c36e99850c6ced66_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections