General

  • Target

    2024-03-05_39bb4c3ed6ef2947efa425e1988f3848_cryptolocker

  • Size

    92KB

  • MD5

    39bb4c3ed6ef2947efa425e1988f3848

  • SHA1

    3f80f9d089a29f917568b39f2bfe121394144a02

  • SHA256

    7d129d3be665c9e9ab7b869d3b9c4253b14c6ec7b5e42c8dcafd0d0e22d3c4f9

  • SHA512

    5ebb7d5b24c3d1f6e963bc4b019c418da03a6c140d0dd0b0d0d8e51e0eedd716184848fca076ddb551b930d0e9e835ea33fd6db7390c34d62aafff6a6680192a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvs:zCsanOtEvwDpj9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_39bb4c3ed6ef2947efa425e1988f3848_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections