General

  • Target

    2024-03-11_6f87c30cfdc9e8bfe874b29d970c757e_cryptolocker

  • Size

    82KB

  • MD5

    6f87c30cfdc9e8bfe874b29d970c757e

  • SHA1

    2ccd6651293e05b640d38c1c4f50c15d786bf549

  • SHA256

    d4bbceb5f7b1028bf15429e8e7409c35baf79afe98b7d3847e13ae3ed9a4e1a6

  • SHA512

    d2a5fbcb92d0d8a43154177e79a0b2e963deec80e3cb1d0e4e64f703ee846d5b3185d372212f330bed9a5003fd3f9ee665e2ef04fbdd7055bbedb65190e31293

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Hv:T6a+rdOOtEvwDpjND

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_6f87c30cfdc9e8bfe874b29d970c757e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections