General

  • Target

    2024-02-29_974639e7a5baedff0eccdd9e64eb47e1_cryptolocker

  • Size

    82KB

  • MD5

    974639e7a5baedff0eccdd9e64eb47e1

  • SHA1

    9546b0ef979639bc8d612a1622c60b95d096dc6c

  • SHA256

    ae3042653f3c2d9081ca3a3c8380802e6f712ab478cdf67ef04ceb5d92b37151

  • SHA512

    7ed5b45edae94d9f8daa0c6d9482f97263482c64fc86a06f194f60e2158896647038c2fc36ef63023e5de1c41f22704ca9291ebb307b28138d312c57fe4b66e8

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Z:T6a+rdOOtEvwDpjNl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_974639e7a5baedff0eccdd9e64eb47e1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections