General

  • Target

    2024-02-24_ef00657b8f2a340833d2bf9d34478f1a_cryptolocker

  • Size

    79KB

  • MD5

    ef00657b8f2a340833d2bf9d34478f1a

  • SHA1

    ad458b3f3c41941dd7f948a8f20a0d78da948fef

  • SHA256

    df31387cf5adc66e5e9259d67836ffb0cbba04c589f8b939efe4dc6cfc89de1e

  • SHA512

    53bed0b69aadad9351e25b636b9b35eb343165d86f8091f79db1eeb407ea6722070a7cceba33c1cd3881c59903f2b758773604acab1e77b2b888888a4077d354

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyTgG:zCsanOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_ef00657b8f2a340833d2bf9d34478f1a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections