General

  • Target

    2024-04-23_49c1914203b4cc18739727d24a3d0dce_cryptolocker

  • Size

    52KB

  • MD5

    49c1914203b4cc18739727d24a3d0dce

  • SHA1

    3b539fbeb9faeb6e1a056cd82b5b4d88bc6e11fd

  • SHA256

    19860439deb904c73d02e744c12839cda688370e11a81bc6aa4d2b17c2268c0f

  • SHA512

    2efe788815bfdec345a44c0b6d370b37b7b6c7907fbaf451852745631f7f9b909cad0a617b30120ecf5d80e708f160625325de559d5e0f8656b285e1372784e3

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOc:z6QFElP6n+gKmddpMOtEvwDpj31ic

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_49c1914203b4cc18739727d24a3d0dce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections