General

  • Target

    2024-04-17_1f439fe22847f6bb389dfce9b5dce7ec_cryptolocker

  • Size

    86KB

  • MD5

    1f439fe22847f6bb389dfce9b5dce7ec

  • SHA1

    804326bc8b1bcb0e31182cea7fed61a580c5a155

  • SHA256

    f29470a9b7dd05d9ed6ac560b66299bc21124f1448f140ca3d13739b852f0592

  • SHA512

    99fc912cdcf8a168952580c9ee5590d43b23d805c85918caa11f4c5841dec7bec92270593c3331bdf80ef520f2cf8477c951a173ded844b9c38facfe1505ccc0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1/3n:zCsanOtEvwDpj1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_1f439fe22847f6bb389dfce9b5dce7ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections