General

  • Target

    2024-02-19_44a80eb30de0697c6314f44eba4c6ce3_cryptolocker

  • Size

    63KB

  • MD5

    44a80eb30de0697c6314f44eba4c6ce3

  • SHA1

    8ebb771b6d31112f0e3a762329748f03befadbaf

  • SHA256

    e36bb7bf315d748bec5dc665ae6cafb3ea5b66318d2489767f1b8873bb69ebf3

  • SHA512

    196fc667b22a0a0179062aa5ae6f1215cda26b91f9bc8177c73994a02c63e6319610c31a01c8d0e962de072024985251d9c83080ff93c5ab0a768019a65825b4

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7A:zj+soPSMOtEvwDpj4kpmeLmv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_44a80eb30de0697c6314f44eba4c6ce3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections