General

  • Target

    2024-05-14_2780f495e6f9c281e22b34b4deaaf107_cryptolocker

  • Size

    89KB

  • MD5

    2780f495e6f9c281e22b34b4deaaf107

  • SHA1

    52b9129714b22bcd35ba1e1759b0376f136a8674

  • SHA256

    5ecc50b731248335d49fc243336c105b0bf7bab6ccf0b6d9aa09f74b4c97bb13

  • SHA512

    905f6dbad6e8e03a5aa012d6c5eb53863a081d2261a35f614ab120bdd017c9306303db47940639285535daec137a94365bfec918012c354aa3bd22a4a226003c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblI:zCsanOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_2780f495e6f9c281e22b34b4deaaf107_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections