General

  • Target

    2024-02-22_3b365393de56f6982a626b6d952fa959_cryptolocker

  • Size

    81KB

  • MD5

    3b365393de56f6982a626b6d952fa959

  • SHA1

    722997184e05c0731dc0e8232472c0f5e5bc679e

  • SHA256

    624e5b0a9672bbb730808dbf9c52d053605a358ac18144530628ab849bf17d53

  • SHA512

    8b877b285eee7b67a1c9c8932abcc1caa961fb663c1f9c086dd99876c49899ce7b96ff11a69fa9cc5905a076b68ef083fe7891b9927a8604927d474bcbb78cb1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdeSG:T6a+rdOOtEvwDpjNtq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_3b365393de56f6982a626b6d952fa959_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections