General

  • Target

    2024-02-12_f3598cdeb642711bf679a32738030aaf_cryptolocker

  • Size

    83KB

  • MD5

    f3598cdeb642711bf679a32738030aaf

  • SHA1

    1e62baa393be7185bc76906f7fec57df0ecb650f

  • SHA256

    e6e8a0b34384400dc051500189a65c57f800537a0896a1d3fced1ace3a47f8ba

  • SHA512

    82f0993e537fe3ae27ed93ebc8e262702fc0e8b0bcf0cd5e9a29ca6229f002a72355c020a66d6afcf245efc27a7c6a39262825867fc0f31c8f2290b0d8849e43

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1c:zCsanOtEvwDpji

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_f3598cdeb642711bf679a32738030aaf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections