General

  • Target

    2024-02-20_15742d05088c7befb9fe00929b4f0fd4_cryptolocker

  • Size

    78KB

  • MD5

    15742d05088c7befb9fe00929b4f0fd4

  • SHA1

    95882dbc77126ca2e4fa928eebfbab12db58c1fa

  • SHA256

    975b503d301067a7403ccc915d36af64322c6d9394ee2dc71458907bdcef29c8

  • SHA512

    0dc731e028f35d909e447f67c5e9ad8331984ceebfeaa02fd2723674d6147495a64becc3329e83f57c758d5133b9683b839f07ad7372cb7ba7e1536953cf8fac

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBK:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_15742d05088c7befb9fe00929b4f0fd4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections