General

  • Target

    2024-02-23_390616d3d9a7d38284abd2396b2cce1e_cryptolocker

  • Size

    117KB

  • MD5

    390616d3d9a7d38284abd2396b2cce1e

  • SHA1

    ffd5ae25f07d171cd45aa5902867eebaadf43f38

  • SHA256

    336f13268410f681d7825b3ffb0d72800abe61af4bbc9b4ef0ebb3f1a473d048

  • SHA512

    672e1266c254b6c74352dd430312e6af87c49d0a7357d9e5911b042b5385e1159984d89038d8c8b2cecfd188b2d62357544e879428af0749692a9290a2ec2465

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01l:z6a+CdOOtEvwDpjczX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_390616d3d9a7d38284abd2396b2cce1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections