General

  • Target

    2024-04-29_39052246df245bc4b662ff83e37f65b2_cryptolocker

  • Size

    80KB

  • MD5

    39052246df245bc4b662ff83e37f65b2

  • SHA1

    c3df05bdc0a01a46f008baa4d0775d79ec90a9d5

  • SHA256

    2a22c068b919ee568f15dcf6db745c1f9869d30774afd98e5655e2a8c689df12

  • SHA512

    8d435270a24fd4d9c746371944c73a49b59e52f2fb7f3d7e1618528b46e95d574ce003f6babb9b10ab3a26ce9ce0cbaad5c0571ce14e68e65a564e1e7bec1d5d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdT:T6a+rdOOtEvwDpjNtl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_39052246df245bc4b662ff83e37f65b2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections