General

  • Target

    2024-04-16_60f0fcaa523be7cd4704b7ae423b1a75_cryptolocker

  • Size

    85KB

  • MD5

    60f0fcaa523be7cd4704b7ae423b1a75

  • SHA1

    5bb64c0388c9f6f0b46928d67faee3a6793bfa25

  • SHA256

    c0ca2e383b941c52f0838e189d7c6f7da8c95cd5ad8a5ff15085256db4f6da99

  • SHA512

    ada05a0a19fea70594b4c8fed843dde1100d5b1d4f3e8fbd5e0f0269f5acd0c151c27d20ae90d02d760e1e7e8dfeca62e4312ca344458ab3dc999455a86917ec

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rb:T6a+rdOOtEvwDpjNy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_60f0fcaa523be7cd4704b7ae423b1a75_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections