General

  • Target

    2024-04-09_7a7a9e4c2f837ee00f164e172c6f118b_cryptolocker

  • Size

    53KB

  • MD5

    7a7a9e4c2f837ee00f164e172c6f118b

  • SHA1

    07409d754fa51cdb89ffe69579078ab8120c10ea

  • SHA256

    fe177a44249bac9db716b3c3460611bf2dc5328f4d9b391d1abd6aafdf06b678

  • SHA512

    b7d75bdd693ca2ecb5bf06436abefd19c5a27e2c6323f247f5565c36a5933d9f363cddfc0ea94c98e6825f4a3492b35a23135fafc02fb8a03b07e2f874668437

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgZ:bP9g/xtCS3Dxx0/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_7a7a9e4c2f837ee00f164e172c6f118b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections