General

  • Target

    2024-04-23_ff331425114767eda834f7cc13e059fc_cryptolocker

  • Size

    79KB

  • MD5

    ff331425114767eda834f7cc13e059fc

  • SHA1

    c4461253492f066ff620c6522744e39b1b967d63

  • SHA256

    6d7f776396878e1b01c2d34ce1f5f59307f484776ed05c5055951068928a048e

  • SHA512

    05d7b7fc407fbabd8d4ae7bfd53b1442cac5b8074eb2a9dbaad627b62b1d680d07e4cefbe68a6823a51af6e1d42b7bf9c955fca0f352835f7a5591d954b3c975

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuq9:T6a+rdOOtEvwDpjNcq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_ff331425114767eda834f7cc13e059fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections