General

  • Target

    2024-04-17_d3895fd76b474eb62bd0a2e2ad7cd7df_cryptolocker

  • Size

    64KB

  • MD5

    d3895fd76b474eb62bd0a2e2ad7cd7df

  • SHA1

    4aaee90f975b0ed38b891d5ea9338d2a8093b712

  • SHA256

    96838ad00ab4577ce25c4becc9d76489f5bc40b92f2265933080dcd9472b97f7

  • SHA512

    816cc52e8c32811a0e212ff0248f4230f67440c3b20071bb7e208f4f960adba81e8182376fdc2f51a1af47030cb5dce69e56516f0563c53a5ec404fdd7690924

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xQ:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_d3895fd76b474eb62bd0a2e2ad7cd7df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections