General

  • Target

    2024-02-23_72662d167830408a36408a7304e97f2e_cryptolocker

  • Size

    78KB

  • MD5

    72662d167830408a36408a7304e97f2e

  • SHA1

    7c201ec5f3c42e6ba711b18a19f7cb3ae79ef8d5

  • SHA256

    2bf44243ea90bb4718c2f97b9be87b30d4f10a050d25788577f7f5b270dbf865

  • SHA512

    edddcee23967d66b767af54f0cbf76459f8c58b1fec3f059c7956c5960a326241068f561910da0080d33afda3b0da37032caa2268c5f6b4cf100bd55f96aa022

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuo:T6a+rdOOtEvwDpjNcO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_72662d167830408a36408a7304e97f2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections