General

  • Target

    2024-04-08_1f711c4c66ac35590ea41f68086de4de_cryptolocker

  • Size

    92KB

  • MD5

    1f711c4c66ac35590ea41f68086de4de

  • SHA1

    fb6c797c808bbb50bf2df0ae2264f1b9378e63a1

  • SHA256

    c84a57f408483ea6619c635169435c1f6b08be982e6f9ac81242cf13861d846c

  • SHA512

    6abd8abf1477488d9725417de3eb9f846eba62b630471cb9f52e254431c3ee9e98fa8eb7c663d7198e11178e33ff1a2a2d5e57f811fa5fddf9b6570a8c28669d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWTE:zCsanOtEvwDpjY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_1f711c4c66ac35590ea41f68086de4de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections