General

  • Target

    2024-04-11_162c414e841eea5e02a7565cf297cb78_cryptolocker

  • Size

    64KB

  • MD5

    162c414e841eea5e02a7565cf297cb78

  • SHA1

    a072de5ed067d1b3ff256c82c613cabdf5874369

  • SHA256

    4ab8e2740d40fef48cbd6b460d2c6f86214aee4998a205b881471e7051fa943c

  • SHA512

    095f9cc1bdaaa806879ead8a28aab7424e7d421dd04ff036975c2ee332a2312a661e637f3f967eccff13b5a19970a13ce724883924e0509cea1b2caea9415487

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7AKk:zj+soPSMOtEvwDpj4kpmeLmQlAr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_162c414e841eea5e02a7565cf297cb78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections