General

  • Target

    2024-02-22_1cf8449b1a5964e7107d4d7103c3fc0e_cryptolocker

  • Size

    93KB

  • MD5

    1cf8449b1a5964e7107d4d7103c3fc0e

  • SHA1

    a74d4ff38c0ca4b65b801a74455f23359a00ea38

  • SHA256

    d208bdcf0a73ab78304ddf721f1517b70cb66f94bc5630cf3152ea74be9cc897

  • SHA512

    263c82c6a8cc5084b221c9e72b47cce3212135844f6050f140bc95b31e0a85e658f3b1e350ccd531b9bef416cf372a344d0037f2c5e69c3fa0a1ea5b595e147c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/Tb:zCsanOtEvwDpjBX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_1cf8449b1a5964e7107d4d7103c3fc0e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections