General

  • Target

    2024-04-18_b333823c52f069d6ee3e2d12dd8ff07b_cryptolocker

  • Size

    64KB

  • MD5

    b333823c52f069d6ee3e2d12dd8ff07b

  • SHA1

    a0b9528b421665ffa0579b33a907c57a80d4a413

  • SHA256

    bf8679c508ef4798333a68c86c018b4573f0ff182245ae5a2fc66f80a3557f5c

  • SHA512

    b93e45804a322ad93d7988bfd59c0f3d57f32ae8c8d3d68ba14b0565d2205f7235d80ad9207a084cf75f3b6cd73c9275beeb0668cd988133b27ff135ca73d726

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyz:1nK6a+qdOOtEvwDpjo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_b333823c52f069d6ee3e2d12dd8ff07b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections