General

  • Target

    2024-02-18_b240c39dcee6fe3a206cb0794f19b455_cryptolocker

  • Size

    118KB

  • MD5

    b240c39dcee6fe3a206cb0794f19b455

  • SHA1

    95eed091f0cbab30f18addf5b2ac73b30fe5a0b1

  • SHA256

    91ba8e9a84b8dfb85eaf0556bc2df7ecf5ddb742f944ce6a94c01a07d8594a4a

  • SHA512

    0eb33284521f2a3df4aee4e3ed85fa0039607f46ccf492306099acbf7418717c4c01294da3b0ea5e54919f2912c63717d797b5507da845eb53bf757cab7ae130

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01QaGq:z6a+CdOOtEvwDpjcz/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_b240c39dcee6fe3a206cb0794f19b455_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections