General

  • Target

    2024-02-22_53ecf12c886e50be7a187922f256a4e2_cryptolocker

  • Size

    66KB

  • MD5

    53ecf12c886e50be7a187922f256a4e2

  • SHA1

    9b3cdfc8ed5cd1d592464c36ac6cda23f6f02ae0

  • SHA256

    ba1827dd8b7c2d389385c31f408f4c5ff9509eacf8100bb9500ff5a7093eaa22

  • SHA512

    f0809e453ed0639ce1ece6e285df6de179c321c5a253a396cfd62ea3bdb77405e67687d4f4629433a5471c39b25d5c242614978f21be1e6db98997a837b731bf

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UncP:1nK6a+qdOOtEvwDpjb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_53ecf12c886e50be7a187922f256a4e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections