General

  • Target

    2024-02-13_db54198ea35a428e1f00708bb18d1131_cryptolocker

  • Size

    93KB

  • MD5

    db54198ea35a428e1f00708bb18d1131

  • SHA1

    0e74957a0e161fd483614e05377a33613c98e1b7

  • SHA256

    050b9678c4a76140224a4c6074573b4ddd2aa95939961ddb488fe443deef8c0b

  • SHA512

    9ba1a5ef728c4d62876f04c5381fc3e692b6dafc71be4686027a7b85f372df28cf5a05e1ca3555583c25f4acc84add88700a3e6fd9f156bd0873285734884e99

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/sf:zCsanOtEvwDpjBy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_db54198ea35a428e1f00708bb18d1131_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections