General

  • Target

    2024-05-16_6e5fdd459e4e78012937051ae496cf49_cryptolocker

  • Size

    94KB

  • MD5

    6e5fdd459e4e78012937051ae496cf49

  • SHA1

    97285f5edf6de0ace2fa124a9d8d5fa96c63a4bc

  • SHA256

    a29b68b67da3f3571157f203d327bebd5b2c0d6f3b83e1cb895797dbe83307c9

  • SHA512

    73501f68e1beda2b7b3e1f274d08e0ddc6b2474581a7bca1e8c74a913b6ebd676f335a98c0c7ba47ff2bdeba18253006b1abacca4cd4318f8ad8dc520c0f9d62

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/k+:zCsanOtEvwDpjBJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_6e5fdd459e4e78012937051ae496cf49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections