General

  • Target

    2024-02-13_653f29ff678fa2756d505052fd6e06c6_cryptolocker

  • Size

    62KB

  • MD5

    653f29ff678fa2756d505052fd6e06c6

  • SHA1

    5e400ea5977e014400218d7653749266614c6b70

  • SHA256

    5510bd2330e850733901a154e1b2e0c03893678196101c5dee6de75ef5791c7c

  • SHA512

    de70c3010c1b84ce3c9b5b96053688a03ac38566befebd314a726b86554a041dc581f9d273a087f6cd86845d7abb37e8db27a8d324c5d5e5b76fda2b1824770f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoV:1nK6a+qdOOtEvwDpjb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_653f29ff678fa2756d505052fd6e06c6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections