General

  • Target

    2024-02-04_9d595024fe62fa8fdab7a161ecbb9031_cryptolocker

  • Size

    80KB

  • MD5

    9d595024fe62fa8fdab7a161ecbb9031

  • SHA1

    8fd5b416c032a8e3253865eb2376d965a917afd9

  • SHA256

    08b5813da86aeeeaa51e73e8bbf0df115866095975eac48a5d1a82df7f4fb26d

  • SHA512

    c3beda9583236e4ad3901b00a56166a58e043ea531cf77633b793072e1a101a2bff5d81b9acca236d75648f765631298be4b607a1493cdb8df26b2025039dc51

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdWZV:T6a+rdOOtEvwDpjNtg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_9d595024fe62fa8fdab7a161ecbb9031_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections