General

  • Target

    2024-02-19_3f8b2faff700c73a142b39b5a38ea5d9_cryptolocker

  • Size

    116KB

  • MD5

    3f8b2faff700c73a142b39b5a38ea5d9

  • SHA1

    e8f336c6ae5657fd7adbb522b45134f59251388d

  • SHA256

    c22e268b8bbc2539c25758a7577f5737d1321a494f0d2e21ef342a44e5d1dff4

  • SHA512

    965ec3526baf2c4bfb80f8c2259a3f691a3aed2ef2b8adb3b66b55ec76d678dc8549127592528d86c93c80ca53b33a4d30eba466670cb9b1038375b96ce7a560

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp016:z6a+CdOOtEvwDpjczs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_3f8b2faff700c73a142b39b5a38ea5d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections