General

  • Target

    2024-03-08_104fe9638b38144b9298cff3f73f2093_cryptolocker

  • Size

    75KB

  • MD5

    104fe9638b38144b9298cff3f73f2093

  • SHA1

    fa25cc2b119d2cdee3310b6dc1d7016e9e25a399

  • SHA256

    9a25efc9d3d4d4ea67b40cb89c8d4c088bb8b47fce9352339336fda59ce353e8

  • SHA512

    cab4b0c76312a822da20af8f564906ecf49d23666bca6a65a554fdaa8ad27a89a7f0db23a312a3aa6670a7070f82176e332ef8904f6efc2f18277dfb1ca595a7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRO:T6a+rdOOtEvwDpjNt3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_104fe9638b38144b9298cff3f73f2093_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections