General

  • Target

    2024-04-30_9ddd3e3161e4242082410e912fd28df0_cryptolocker

  • Size

    60KB

  • MD5

    9ddd3e3161e4242082410e912fd28df0

  • SHA1

    c78cb187408b0cfb68c47baa8a8744521415cb85

  • SHA256

    73f59326ba3935dfe37b0e00beeac0f21d952afd441f3604973cc574ba227de1

  • SHA512

    df7660effabb4bd45219add5860eb5fcc24ba785134d957fbc623d478fcdcad37878f732a44923f29e92912e3702e189463514ec138323c0caef4923c009630e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app6:z6QFElP6n+gKmddpMOtEvwDpj9aYaq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_9ddd3e3161e4242082410e912fd28df0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections