General

  • Target

    2024-02-20_5e9b5467dc4b913281eb5df5bfcb7cfb_cryptolocker

  • Size

    80KB

  • MD5

    5e9b5467dc4b913281eb5df5bfcb7cfb

  • SHA1

    66601ef29c747ebd5e3c91cb20fc8c32e0f96593

  • SHA256

    b20f308019daf069f1b3feb38b6d8d94f1fb41a5471fc2bd3d1c72249fe882bf

  • SHA512

    ddebea7499aa556f55c7014221c869f1d68f27e7e931b085d9903ef7571daad7471b6c893089e798578a33da50df7622efbb8bcc3b9af4bc6791d9fda84ed5db

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0Pb:T6a+rdOOtEvwDpjNtM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_5e9b5467dc4b913281eb5df5bfcb7cfb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections