General

  • Target

    2024-05-23_e23325908c458a3a10c44496dfffd41e_cryptolocker

  • Size

    81KB

  • MD5

    e23325908c458a3a10c44496dfffd41e

  • SHA1

    55f904dd638fe07e35072c0cd520c87ac8d9660b

  • SHA256

    341a09bb18a4be0650ec335c4c308a74277046b2a26b7f53488125864d29cbf7

  • SHA512

    a3fdd5242b998b81cea1d2d9517b66b9844653429b1f824092248a52962ecad9af34ed96cc26a98116715e9021d2db536d975fc50a2c37790f2b888bccaa0e89

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QpKc:zCsanOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_e23325908c458a3a10c44496dfffd41e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections