General

  • Target

    2024-04-25_d2c2fe8eccd452bf7f4a6e44e1fd2f20_cryptolocker

  • Size

    83KB

  • MD5

    d2c2fe8eccd452bf7f4a6e44e1fd2f20

  • SHA1

    b078feca75c93ce055db8433cbe06776c98ea03e

  • SHA256

    a3c2769412b9d162cd612e1b44743454107f631c67e8ac607920d2b6a788cef1

  • SHA512

    571095259066d4703ab46a18dc361e3959cd4edccbc3e6bccbdd4fe232b89b256dfeafd03808ddd56b1b7c49d946eecab1d8e92921de5de780aab0715dccc2dc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1l:zCsanOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_d2c2fe8eccd452bf7f4a6e44e1fd2f20_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections