General

  • Target

    2024-02-14_3393378936aa8548e22f43a26bcad1a3_cryptolocker

  • Size

    97KB

  • MD5

    3393378936aa8548e22f43a26bcad1a3

  • SHA1

    f6e346c99b19579f45ef7cc3632606171e318a91

  • SHA256

    50bb60448c1fe63b8496d024e7887d4ff79c20b2547b1cef7a70e88f96a145e7

  • SHA512

    9d93862361818dc6989e7eb12290693ce99f08bd06c399abed4ca0f35f6f190d3a5782bcd7258f8641b88c9c3e12bb86aa8433b886a29f22561709bbf6f2f0be

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BC:z6a+CdOOtEvwDpjck

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_3393378936aa8548e22f43a26bcad1a3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections