General

  • Target

    2024-05-10_3c45aed9ba0725c6c0613fe43daf9709_cryptolocker

  • Size

    78KB

  • MD5

    3c45aed9ba0725c6c0613fe43daf9709

  • SHA1

    07b1d172010cecf9a24bf533772271f2b3cdae96

  • SHA256

    2e4cc0d42c5113e556f57c270f4275d37a31a8dde586e722bf00935004dfeb9c

  • SHA512

    0c0035cb98be2f40cdd0ea31cc2c532b059588e1e2cb22f5f41058ecad0fb227bc802f8a65b292a261bc827e5a7c5ae9bbdeceeab883b27777dda1374321ab6c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRE:T6a+rdOOtEvwDpjNtR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_3c45aed9ba0725c6c0613fe43daf9709_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections