General

  • Target

    2024-02-24_7cd017b58feea60310a1af9b75a7ce09_cryptolocker

  • Size

    62KB

  • MD5

    7cd017b58feea60310a1af9b75a7ce09

  • SHA1

    1a09ffc1aed66b99712f9c88aaa424ff1324ee86

  • SHA256

    6ab21a7aa2d58b82c27e9f9585982c7dc075d58792cdbc0886fece7c55b70017

  • SHA512

    c8fd7a4fcd3e3aaf62a2d1867d61ab61b982b52bb66763b8e3252fe4087e4c6250903227b3b22d99cb33deb5a586d19b3c27de67e98f1f2b234d0a276449ad5e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8E:1nK6a+qdOOtEvwDpjc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_7cd017b58feea60310a1af9b75a7ce09_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections