General

  • Target

    2024-02-04_850904dabd480fab5f624d1d4453475f_cryptolocker

  • Size

    82KB

  • MD5

    850904dabd480fab5f624d1d4453475f

  • SHA1

    7eea19c49c70a1ffb47c4576c48c42da4383ab25

  • SHA256

    0f68f3ff8d1dd98e5b62be19638a64f9456136d4bdf5b560a9fae3861d0190a1

  • SHA512

    e29d87f5b409af6ea1b062b39536cdd9c72ea6c1e567460b52660ea427cf21b79e5a5c4b39ec56351aa01106c822bdd33e224e77d4e792a432f1f3eb8dc836ef

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1nl:zCsanOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_850904dabd480fab5f624d1d4453475f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections