General

  • Target

    2024-05-09_7edd41a6e0ca0e79c7b9ce914da9989c_cryptolocker

  • Size

    85KB

  • MD5

    7edd41a6e0ca0e79c7b9ce914da9989c

  • SHA1

    6fcfe96dd45c58c5710d86bf98e4c73aede953b3

  • SHA256

    2a37a13271b76d88745fc2caa9e15074e00c0f6af8d7bd57e56dd9f07fd7befe

  • SHA512

    05c6672f3fa923ab758d7213dc34d0964ce792c4bef6cf4cc024a869f4cdc078f6c64fbbfdd800f0b1985772be612969c1cfac939a9bfdd860d0ce9f4131a374

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5f:T6a+rdOOtEvwDpjNc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_7edd41a6e0ca0e79c7b9ce914da9989c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections