General

  • Target

    2024-04-10_9994964acd5601059179629012e69459_cryptolocker

  • Size

    84KB

  • MD5

    9994964acd5601059179629012e69459

  • SHA1

    721a7057f2f3d69e43ec9bee522f2b9d992e0dbf

  • SHA256

    8a1a4acc864f95d80807ad9d937598406896b96a699dcbfb28b529fe19cacd95

  • SHA512

    0c13fb7cfe94a3170121e653e5fa35894571c3418afffef4c8a29ef99704c3eb3929c971adbf4335a9a48db6c87c9ea3f2a63f8e5b36c20c5a757b53786dc2a8

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5R+:T6a+rdOOtEvwDpjNn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_9994964acd5601059179629012e69459_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections