General

  • Target

    2024-02-03_bd7c826e9c360d826966d715d92e204e_cryptolocker

  • Size

    60KB

  • MD5

    bd7c826e9c360d826966d715d92e204e

  • SHA1

    dfcb9be758bca7aabc358ef34b1ea295e5da16d1

  • SHA256

    cf165d0965e4d904962a6adc3c006eb0e67a1425cf7d0699180f960e2da935f2

  • SHA512

    3b9a4eb3a6e6c18b847a167771cc163031e09e9de163d0086ab9a8d6112b16ba4da62f0dad7559ff635989a85e324e060caac2c7edb4e636d1b29f9741338468

  • SSDEEP

    768:qImnjO6LsoEEeegiZPvEhHSG+g0gum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+g0dmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_bd7c826e9c360d826966d715d92e204e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections