General

  • Target

    2024-02-18_50a11c3162288879e1d08d58ed8343b6_cryptolocker

  • Size

    70KB

  • MD5

    50a11c3162288879e1d08d58ed8343b6

  • SHA1

    cb2c510931a26e42ffc0b90137abd9cb9e1ca0d5

  • SHA256

    4528ba8676d60f92c68daa7b6e7cd1c4dc5d58d20316a9ee10899eff048e0275

  • SHA512

    36a6e63a12d8340feaeb023f947172bc8686b43d9d736f3fff2da37d2dba9aaf3119e201d9c308e60e710c686b0500f942525962586884f427945c0bcc8c04c9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal3Sa:1nK6a+qdOOtEvwDpj8P

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_50a11c3162288879e1d08d58ed8343b6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections