General

  • Target

    2024-04-11_402e5411dfb03b35faaf252b95f3ce57_cryptolocker

  • Size

    110KB

  • MD5

    402e5411dfb03b35faaf252b95f3ce57

  • SHA1

    9a9d81fd52d8220c2b7584c0d69c44d2ff931cde

  • SHA256

    170cbe84dc545d1ac49ed859e0912b21a265af128e45a7fd697b8b7aa9f11a8a

  • SHA512

    89b2332050471344f3eac9198e5b2fa619dab5bdc8d2f16d556c7fc78de1619c948050376694b2204bd38a0b4467383dabdbd80ba2f6ad2f9874a1b17795fcb8

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMgu:z6a+CdOOtEvwDpjczi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_402e5411dfb03b35faaf252b95f3ce57_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections