General

  • Target

    2024-04-21_a0743b7af2e7b571f013651f41da0ac3_cryptolocker

  • Size

    51KB

  • MD5

    a0743b7af2e7b571f013651f41da0ac3

  • SHA1

    c96724a5f312e3e7e835ff8008ebc17b59a81e28

  • SHA256

    893f781f340d47d116efdaf3eeaf0fdb355d20c619d89e26f3cfa8102091af55

  • SHA512

    7b8c50dc9ada35126c5e10d0468943500421175f11133d00dc980f588eb85fae7473d58b19fc7587b0fb13de49392e788ec6a7b7eaf97377a5ffbbc441067953

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOh:z6QFElP6n+gKmddpMOtEvwDpj31ih

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_a0743b7af2e7b571f013651f41da0ac3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections