General

  • Target

    2024-02-18_f0658acc6b5690c2869f79c8273d9a90_cryptolocker

  • Size

    71KB

  • MD5

    f0658acc6b5690c2869f79c8273d9a90

  • SHA1

    dc7476c5d333dccc58c2fd6cd98c020567769c74

  • SHA256

    db6109d6f66b7bc5e535bba1247274e61594e004df67edeebaed885ce6dffd27

  • SHA512

    abac23783678e841852c1c9db37673faa20c4c023c2035bcdc0e78973ff8cb2f06e480eeb00dffaf0c341158931ef102cbe0e76a0e20d81a6bbdd283562eb59d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalW:1nK6a+qdOOtEvwDpjT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_f0658acc6b5690c2869f79c8273d9a90_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections