General

  • Target

    2024-04-24_f93c32066b14137e716af7e613cf9cfa_cryptolocker

  • Size

    65KB

  • MD5

    f93c32066b14137e716af7e613cf9cfa

  • SHA1

    d8d75d90ce97fc2960e91f900e30c3c041811dbe

  • SHA256

    078bc6a120d4d45cb0cff91e0dd817e60fa81dec34f51a531a8d11551bc6a1bc

  • SHA512

    c2ba91691554a0f56951f5ac7e91a04f65932643d324a692bc025405e5edaccb304a951e8b9bf62af42e25f8ae9131a60a54808791c9295cc836083c27e99cae

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyl:1nK6a+qdOOtEvwDpjy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_f93c32066b14137e716af7e613cf9cfa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections