General

  • Target

    2024-05-01_4bb6b23ae6d37874f9c419bfb5c4c885_cryptolocker

  • Size

    79KB

  • MD5

    4bb6b23ae6d37874f9c419bfb5c4c885

  • SHA1

    b64564039c9e2f0fbb50f8e6ba6a0d6c7b43e830

  • SHA256

    579d13fcefbc2ea5b4e17a4d645d75a28dc33f7b98d01eb7a097ccedf654b388

  • SHA512

    bd6bcd7007cb0c7d1337db4a411c1a79c4337b78b65022643647315682f16ad7d4d761e9a6f553554abb37ffe9efbe0399014feef8bb13692128a68c9f2caa00

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqUk:T6a+rdOOtEvwDpjNcC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_4bb6b23ae6d37874f9c419bfb5c4c885_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections