General

  • Target

    2024-02-19_548386baf578208008ff070e16c2ecc4_cryptolocker

  • Size

    106KB

  • MD5

    548386baf578208008ff070e16c2ecc4

  • SHA1

    8ddf443167e688a4e610c45f0a8b5aed9deab74e

  • SHA256

    a2e64b2a1abb9892b47553a57ff7d068513bdf29895f918d6eddf26b943e8764

  • SHA512

    699d7edc32cc641a54c615c9c834cbe81bb9e0212e2cd9a18bddc07a086da09fdab766cc20e4dc3d7614c1cac79e7f7aacdd8ed3805f33b655e9a728b22a189d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksSt:1nK6a+qdOOtEvwDpjU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_548386baf578208008ff070e16c2ecc4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections