General

  • Target

    2024-02-19_a4c84ae7cb16d88ee568b364ac6896f3_cryptolocker

  • Size

    103KB

  • MD5

    a4c84ae7cb16d88ee568b364ac6896f3

  • SHA1

    b5d3b578881ce88fc77c16512cc956bec95fac21

  • SHA256

    96821e2cdc8538a2ae6ba7bfda30320f7fdec437d3e577aec4c15ae223c0600a

  • SHA512

    ff8cb48d348e33fc17c8d3de087e4a4888a5499596fab38b0f3105c74db2aa80c4e32619ab3ab45e49314933281a98b23f09d33987e2190599b419a74103e9e3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks0H:1nK6a+qdOOtEvwDpj0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_a4c84ae7cb16d88ee568b364ac6896f3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections