General

  • Target

    2024-05-17_67dc65560b166e7bdcb82e2f27edfc04_cryptolocker

  • Size

    58KB

  • MD5

    67dc65560b166e7bdcb82e2f27edfc04

  • SHA1

    2d89b97dcc0e748bfd28529a06327db477f8626d

  • SHA256

    911416bbae3455795de49be71beed2b4253690b817b1486c733ef1783bf66e95

  • SHA512

    74f45ee0382a116b800862f86754da4de4660ea6eda404bfcf9fa6217f08f879b4d055b0919da9d3af74f3aa58d5340692eb9c642969085cf569787e5afd77c6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axK3a:z6QFElP6n+gKmddpMOtEvwDpj9aYaQa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_67dc65560b166e7bdcb82e2f27edfc04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections