General

  • Target

    2024-04-23_bc428bf1c3ac97b35aa990ee5a1cddac_cryptolocker

  • Size

    65KB

  • MD5

    bc428bf1c3ac97b35aa990ee5a1cddac

  • SHA1

    74bafbfad2abc499e6c3eaeba9c3737ad83f0bf1

  • SHA256

    5ee0ae9f430ee1365b85e93d6fc84a028fff07458a863bf4a2df7658f5a91be0

  • SHA512

    02bd41ed4f4454a4fc5231298bd23aeded2c8e6237e4f64495fee2aa1ed09cc7629a4ea56a57336be67fd62494189ebf07a947b6ebed7d799f25c0181a8319f3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDy2:1nK6a+qdOOtEvwDpjh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_bc428bf1c3ac97b35aa990ee5a1cddac_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections