General

  • Target

    2024-03-13_5351149f97d3e42263b43d0ad5ef3b4e_cryptolocker

  • Size

    83KB

  • MD5

    5351149f97d3e42263b43d0ad5ef3b4e

  • SHA1

    d248c9552bcaf4049a3b40f7c51007ea522bee44

  • SHA256

    d6d7a9c66bd8dcdfe123846ac89a0c58cbc1f179bf7a6556cc433fe3dd20ac71

  • SHA512

    01c943124b96fd9b4e43ded5e6aa0643b38a99094ee3878a737da02868291b3c1c3a83b6c9aa30d50a0d5ea74900880342dd15f29050d6e7583ed3cabc4ba7a0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vw:T6a+rdOOtEvwDpjNU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_5351149f97d3e42263b43d0ad5ef3b4e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections