General

  • Target

    2024-02-18_4917ef485c2133f6e9d3d070eb3399fe_cryptolocker

  • Size

    117KB

  • MD5

    4917ef485c2133f6e9d3d070eb3399fe

  • SHA1

    c5ea41cdfae96399e45748ded54ebdcb469c2a15

  • SHA256

    16ff9c67506162287337add2d080618eb6567a9d60efc19fc3276a2758484f25

  • SHA512

    5683b513b31eff10ca15a011e6d6018b02e7a28e192f9dcfc357b787124417bad30fa4a0f57a9bb83e05c635c9c665ade4edb97cbdf363fad524fda6219074d2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01PV0:z6a+CdOOtEvwDpjczE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_4917ef485c2133f6e9d3d070eb3399fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections