General

  • Target

    2024-03-12_133596b99c2f3e2d197b4e2773063a9f_cryptolocker

  • Size

    118KB

  • MD5

    133596b99c2f3e2d197b4e2773063a9f

  • SHA1

    cd141b2d514c3fc1ceca75a2f1721b6cb97f5019

  • SHA256

    22860039901ddb8c78b08372a722646d872a32cad509c58ac465091f9dcf2fbb

  • SHA512

    f015b2a63038958248ac2facc1fd7b8f7225f226caf84f8945a9b58af249325d441f5a6c30327da4301991d1d5e9222c404619b209d7a42d70043bb1301a66d4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01Qa/:z6a+CdOOtEvwDpjczl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_133596b99c2f3e2d197b4e2773063a9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections