General

  • Target

    2024-05-09_b0b4386ba30789a9f1418ff381cf9d94_cryptolocker

  • Size

    79KB

  • MD5

    b0b4386ba30789a9f1418ff381cf9d94

  • SHA1

    3b83c82b283ecc349d6a4040b41ed00b7b02897c

  • SHA256

    905265d86e517962e9d7d9d9e0715dff35b1f7801252fed9e3fc5baf46d74999

  • SHA512

    9861e6a38fa6258c911a4b8855a141daaf9f2d6242f1d60c6ec6eff57929bcf53c3fb5070d53bfef38895b20c346175226322886a2424e0589a8566bd9d2a4e4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqdC:T6a+rdOOtEvwDpjNcv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_b0b4386ba30789a9f1418ff381cf9d94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections