General

  • Target

    2024-02-29_0b928dba1b9f70fe0dd6841c47eb7e58_cryptolocker

  • Size

    92KB

  • MD5

    0b928dba1b9f70fe0dd6841c47eb7e58

  • SHA1

    b1510e2753d7dc8b45362b170b8c9ec85b3e1cca

  • SHA256

    f71133bb78e6e03995d568b0cb3643ece418dc37fb6d11274c2dfe88f0653dbf

  • SHA512

    cf26472bdaab2c5d0cd2ca8827e35cc3066c84cd730fdcf34a22416368cb393082d45bc5184bef8613d9c147850f69e6be8d904ff245373bd019c47e733a0805

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87UvaI:zCsanOtEvwDpjq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_0b928dba1b9f70fe0dd6841c47eb7e58_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections