General

  • Target

    2024-04-30_c2a9fe199cbd56fcddca63645399f7ab_cryptolocker

  • Size

    83KB

  • MD5

    c2a9fe199cbd56fcddca63645399f7ab

  • SHA1

    e337a2e24a552028e4148f75ffb1d2a647ea869f

  • SHA256

    30f754dee8ba8ae6c3f6d78b8683be755dc56fcae27ade517c05cee7c535e0b2

  • SHA512

    599d23f329080dd0797f9c67059d2f805b4668e17cb02f62c7423d12bb8914ecca03ac7c5a6530a38ccba0f206ad8199023496425f7c3e0088153f6af551d7cd

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS18:zCsanOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_c2a9fe199cbd56fcddca63645399f7ab_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections