General

  • Target

    2024-05-20_dc1cc45e7f51801b38dd6e62b4a8a7ba_cryptolocker

  • Size

    94KB

  • MD5

    dc1cc45e7f51801b38dd6e62b4a8a7ba

  • SHA1

    4808976edd8ae8a52762dd3d9d32f827d4e03d5a

  • SHA256

    03d78a3385c8cb7d3c37d7dd6f4db3c6c17e5f02af2deaa448f10c11976b2be9

  • SHA512

    89495e5750e37ba15e1de04f4f5831809d7720f36d3bcce58a1136df41683ec55e6c1e088496b1db6d474c3d674395dfa73056df593165813c9ff9745ae21550

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kd:zCsanOtEvwDpjB6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_dc1cc45e7f51801b38dd6e62b4a8a7ba_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections