General

  • Target

    2024-02-12_edfb29c4b289e3724d97e5a97317b2eb_cryptolocker

  • Size

    67KB

  • MD5

    edfb29c4b289e3724d97e5a97317b2eb

  • SHA1

    9bc0c63910e6e3a5b68b04eea322f9500c1d5471

  • SHA256

    f50f1fb29058cf921b88ab90443ba9bec0127b52a3c400967757c9bfbf6d7726

  • SHA512

    04f1764a6a09c5dafc9e626cf50ad0ccccbb891ca540526d6f9fd269b97429dfaed2ea90f03e5334b9078071c08833894804b12697083743a32a1030a1fc1214

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBR:z6a+CdOOtEvwDpjQD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_edfb29c4b289e3724d97e5a97317b2eb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections