General

  • Target

    2024-04-17_3274273e7e8e76ee1bfbf43122909535_cryptolocker

  • Size

    93KB

  • MD5

    3274273e7e8e76ee1bfbf43122909535

  • SHA1

    187dfc3f7a96c58294b79d2a5b76418beee155e9

  • SHA256

    1b73bdcdd97154bdc3d0c5c7660fc473e827900d6fb0d432f11580ffeac00652

  • SHA512

    84d1dfdfe8ae328e7f22f0b04714bba86a7d916990f35808bf98a47127f8ba50c2cbb7e2265737920bbbf0788afc4d957d9b19738f793bd49609dfcafab55a70

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/9:zCsanOtEvwDpjB9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_3274273e7e8e76ee1bfbf43122909535_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections