General

  • Target

    2024-02-25_147948e27c7d8fdeb6040d4396fe0011_cryptolocker

  • Size

    74KB

  • MD5

    147948e27c7d8fdeb6040d4396fe0011

  • SHA1

    6cc656b57879836c9297c2e7a632157a60e1d7b5

  • SHA256

    60c6140fba72f127d767ad1ce96e4a639dc2d386c3a7b7d2c7f13e5f082c9484

  • SHA512

    31603b8f4a2cac283ade5463a2c7a09407bfc50b4a651bb44d6d95eeb600225dd28ef0eb84a0c7be6adcef54f276d99f15cb527b91c8b3432a64b4eb118bb9da

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4A1:T6a+rdOOtEvwDpjNtHP+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_147948e27c7d8fdeb6040d4396fe0011_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections