General

  • Target

    2024-03-26_23b90e87c5dc817abffc9bbab465417f_cryptolocker

  • Size

    119KB

  • MD5

    23b90e87c5dc817abffc9bbab465417f

  • SHA1

    a0054ef2d38245c268cada498943fffa3e01a055

  • SHA256

    39b580db3f4b6581a8e13e7f4d83edbc8e2cc6c49a7bfbe161d788721d8c3e67

  • SHA512

    a9a6d4872751a450d88c011f4447178258fb678c46926b72a00e136469b77075afab2db8901d30b79a006696cf20f46ebecfefa32a188d6861371c6369e81107

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01ZNRm:z6a+CdOOtEvwDpjczG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-26_23b90e87c5dc817abffc9bbab465417f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections