General

  • Target

    2024-02-12_43724da01f8c48344977019d203018cc_cryptolocker

  • Size

    121KB

  • MD5

    43724da01f8c48344977019d203018cc

  • SHA1

    c37ea65ec4767685ce7ff0cd681a861fa36a090b

  • SHA256

    2c43c6c799a85dfe7755b64d97cf7955bfd3fd77cdb5dae3058f0857855a7ca8

  • SHA512

    c81961aa86dc0151a0b1a13ef2a912aa33fb6c851176cd4b6c5ed2b739c939d7cbf9172e58ee0159260b06d04fa4b8a7136677b80846e4b9d869bdd869129f58

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviy6o:z6a+CdOOtEvwDpjcz0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_43724da01f8c48344977019d203018cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections