General

  • Target

    2024-02-19_df5a1141cdaf6205db3e3181631e3b72_cryptolocker

  • Size

    148KB

  • MD5

    df5a1141cdaf6205db3e3181631e3b72

  • SHA1

    b2918ccd755ce2e2cac75640e5a695760ce19ed9

  • SHA256

    74813366d8890ddc43a0cdffc59405f0ce99cd83721a4574e58ca9a7d37699e4

  • SHA512

    c5934f1c44e81d9a0529fa987cdeac3dc1c02332040b05a906f5cc898eb820e65e605338042bb748c4f217692a48b50c53ebb0b2020a72a4219830b4f5e5ba6a

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1e5:z6a+CdOOtEvwDpjczj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_df5a1141cdaf6205db3e3181631e3b72_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections