General

  • Target

    2024-02-20_3e7cb1db414cf1e9e55b01f8601dbfa3_cryptolocker

  • Size

    117KB

  • MD5

    3e7cb1db414cf1e9e55b01f8601dbfa3

  • SHA1

    ae4913c1aa22563c597e6ec1fe739be3b51ca2b5

  • SHA256

    363fe7e183db87d345d08c5fcd53884a31d14086401dc849fd19820180b8e711

  • SHA512

    f151014801c749e5b5b35041806f08e399617fc55cd7845bca45e49163952ab1b7105f2183d93601d5e8f857800888cf0587167129eedd16dc36f97fe8ad65a2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01J:z6a+CdOOtEvwDpjczb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_3e7cb1db414cf1e9e55b01f8601dbfa3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections