General

  • Target

    2024-02-04_579e1512c90acc39e1e8c3740a66339f_cryptolocker

  • Size

    115KB

  • MD5

    579e1512c90acc39e1e8c3740a66339f

  • SHA1

    9b9e85e838d09f631efe1ce197d0e292b74157ff

  • SHA256

    f6cc328bae1fc69c41cef4f34769aab9005e510da98c88adc7e93489ba028c57

  • SHA512

    5c104cfffc032b52d45ccb03a9830dac77ce003fd6123d4d3a199651612b605a7218ccacb67cf8912847b74ae607ac52554447f764340f3225bd7f1af0d7bd76

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/ci:T6a+rdOOtEvwDpjLzE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_579e1512c90acc39e1e8c3740a66339f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections