General

  • Target

    2024-04-25_1b9ec4ab1bf54104e660b781c2e4de1e_cryptolocker

  • Size

    76KB

  • MD5

    1b9ec4ab1bf54104e660b781c2e4de1e

  • SHA1

    f695bd2297e253f2d79ab5df79738290f9f0ce9d

  • SHA256

    74f0561bd640c828ca358e96d3f62d58b1eaf355fd0c6824e080aa14164a408a

  • SHA512

    9c6bf57cd967a988e2719f779f2dc0ab2b03fe37626bd63a02c75b34c93a8d28018f6fd1cde1a42827210e32d762ed26827dc63c484b87a279be171a505730d9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx+:T6a+rdOOtEvwDpjNtHPt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_1b9ec4ab1bf54104e660b781c2e4de1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections