General

  • Target

    2024-04-10_4c53405f28b2b549ae27d09750003e07_cryptolocker

  • Size

    59KB

  • MD5

    4c53405f28b2b549ae27d09750003e07

  • SHA1

    470df96bda621810d6cb31886cb855a0cc0bf6bf

  • SHA256

    21ed77a97186020d1328e8f159c2b0698c62152e774f3d9f8d08381c70f24f97

  • SHA512

    f6c8ab648c2b467332e889122743fe95926bffc2c03b664e05dbd70b4055771545e7edd2998017e18f196464d65c4f842df6ad1a7a2b4df12e0e711a8d98b8cd

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnymL:zj+soPSMOtEvwDpj4yRymL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_4c53405f28b2b549ae27d09750003e07_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections