General

  • Target

    2024-03-16_d5d7fa4b91edc73f61c79f975cb2c708_cryptolocker

  • Size

    64KB

  • MD5

    d5d7fa4b91edc73f61c79f975cb2c708

  • SHA1

    88ca6a71e3d621c68e8e1c6fa1d853322ccbbc51

  • SHA256

    9016c347f7db3fd8a5fc9cdaf97bb6f07cf945a52180cb9d2bbc7477215adf0f

  • SHA512

    77b0eade832f590b68b3ae260eba259611abfbc02ee6a7a3f65ddfa8b7155beeb86172d95d3423da6873d4c116ab10635d3ac3d96b6152b220a52626c0d6e284

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoH:1nK6a+qdOOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_d5d7fa4b91edc73f61c79f975cb2c708_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections