General

  • Target

    2024-03-07_23bc13e744b44f8aa8458380cb5a048a_cryptolocker

  • Size

    62KB

  • MD5

    23bc13e744b44f8aa8458380cb5a048a

  • SHA1

    5efed2d416b417aa301a2146590d9a5ef2bb4155

  • SHA256

    44a9caea6a61d27303c32481160b94c11bb1bd55c93d270fefe203a5337335da

  • SHA512

    7305c01c462312e5b4a9f55bfa683f754c71ebea50d316084453469973da14b39218f4d35051c5aaf2e2a8c3f7e15cb5c441e0bd87429a7d1a867c5695af92dc

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVuvN:zj+soPSMOtEvwDpj4kpmeLmncV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_23bc13e744b44f8aa8458380cb5a048a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections