General

  • Target

    2024-02-17_c5837e913b7931868337be3000a7c13c_cryptolocker

  • Size

    76KB

  • MD5

    c5837e913b7931868337be3000a7c13c

  • SHA1

    b9b7c573b7478bc0db7f1424c08eb22841a52bb2

  • SHA256

    663ccba7a72486de8aa3bc6f5ce6b968b9459cbac3e6f0f4a506d8e79f2f8d0b

  • SHA512

    abcce244a6b038a0c336beb601cd883bb984e6b08e6ad59782b1ff9e60b10c9a27606cf1f90ad37097cb37176bc99192a68e81cc74c4c8942a9932e4627a790a

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBI:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kya

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_c5837e913b7931868337be3000a7c13c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections