General

  • Target

    2024-05-01_374b4d7158490a63aa95b7695c04734f_cryptolocker

  • Size

    96KB

  • MD5

    374b4d7158490a63aa95b7695c04734f

  • SHA1

    7b426dd80fef8781f7577904e4b19caaa7c97c22

  • SHA256

    e645c9a14d12a8f699538980a874eb5a63732d044deb8074e67b87844d613f8c

  • SHA512

    b5f658c7a9f9c5454327f7476c4399e43c396922d6346ece3108e11fb091578c549ad5f78808054e99e6ae7337699441cd13fa2793bd0c5c0a97ebb065ce0a8d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqg:zCsanOtEvwDpjBd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_374b4d7158490a63aa95b7695c04734f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections