General

  • Target

    2024-04-24_e9f2642294864946edb8a1ddc3e20358_cryptolocker

  • Size

    67KB

  • MD5

    e9f2642294864946edb8a1ddc3e20358

  • SHA1

    87497fb17fb71a62a20380a644a86dd1f3178dbc

  • SHA256

    4de0b26f4bd3c458b9aa3da4f32c85f96efc914cdd8c7afcdd22118ffa62045a

  • SHA512

    272ac63df3096b11575e24305d01b647e77bf65a1d81606b9533843a54b7a89c152143a83b79bc5ad27ad9c5b834420f52bb8be7dfed6e3ec49227d72448d42c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRhI:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_e9f2642294864946edb8a1ddc3e20358_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections