General

  • Target

    2024-02-22_55352193ee7dc4720f5bf3fed33917cb_cryptolocker

  • Size

    71KB

  • MD5

    55352193ee7dc4720f5bf3fed33917cb

  • SHA1

    08908e94cf6894a19ba2a08af7549f3d119a1050

  • SHA256

    6049948bbbbde2664fe3ea6e5fd366bf6c078b503d7b9e5ff7843053f5d90095

  • SHA512

    a5128af065a9e81703389b37cec8be39c98c3716b983598767c9521b5c28b3fecc92f4410a090e9fff9e8861aba2a469a6ca6ef9e4b26e969b2846850edb2681

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalP:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_55352193ee7dc4720f5bf3fed33917cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections