General

  • Target

    2024-02-25_5bfb1f6522a2f52af93f9f061ad72267_cryptolocker

  • Size

    117KB

  • MD5

    5bfb1f6522a2f52af93f9f061ad72267

  • SHA1

    8b339c78dcca9c26e79d6d040dcb46d81906d219

  • SHA256

    994c38f50858c2c02d8214e4bde2776c7473d771f4c84fd4adb6b119afedfa0b

  • SHA512

    0f47ebad7eea3dfbc5ecb5baf757dbee74ce985c84b9eb9ce4869b60bb88df800fb9328fa914cad847553f79ab12aeb1e200531a2f9946e274c47de932209f87

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01XYM:z6a+CdOOtEvwDpjczr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_5bfb1f6522a2f52af93f9f061ad72267_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections