General

  • Target

    2024-02-04_bd13995e3c46af7596eb1d368dcb1ad5_cryptolocker

  • Size

    81KB

  • MD5

    bd13995e3c46af7596eb1d368dcb1ad5

  • SHA1

    86edc2b6301c413734cf45b22481ae2c761569f7

  • SHA256

    3bfb2ac2455c62435b199b43bf40515fc2a6d37d1f51555769cd34b85b1b5ae5

  • SHA512

    16246c03e9ff4946939cf66b94b87aa83e1b683e7ff176f34aedd9396a0ee3f6af13cf0f6b5607f67f7e8eba4bbead2210532d63c1e5de81e164cad1622c603d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7v0D:T6a+rdOOtEvwDpjN6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_bd13995e3c46af7596eb1d368dcb1ad5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections