General

  • Target

    2024-04-20_1c10b153a6923b56a17cce33bfb80317_cryptolocker

  • Size

    64KB

  • MD5

    1c10b153a6923b56a17cce33bfb80317

  • SHA1

    9a582aef3db6ba7651d4c69968de5d4b2eccc8a4

  • SHA256

    0865c7099bc9e8bdacb16370a28a9c6f12e9842c2643cfce38e5246ca6eff6d4

  • SHA512

    a01ac0277c077a07a36f9a4114a188a2f6713ef0f2cb7baa2a4f5d5eed578e1453db425f6facf121d43870d6dbc1b40525705b849566e3c1f97c3ad2acc7a8d3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDy1:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_1c10b153a6923b56a17cce33bfb80317_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections