General

  • Target

    2024-03-11_4a425e2f349d0059c8c60f44702de732_cryptolocker

  • Size

    80KB

  • MD5

    4a425e2f349d0059c8c60f44702de732

  • SHA1

    c80f36cdd709c093c6d047935efc7a09bc7befd5

  • SHA256

    d374cee7e7999930cb4e9c9d77ad5d479b772ef5b57795b18161b93739c8bedb

  • SHA512

    4025ffe42fc7e5eeedc33993febf299401b867c808bd6e585bc14fc829c635fa4b6f15d871a1fdaa8c0c27757fe243153c9c863da98e35fa06298893cb1868af

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyTgh5a:zCsanOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_4a425e2f349d0059c8c60f44702de732_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections