General

  • Target

    2024-05-25_13e71a119d312a3e1f2d88cb0ec1380f_cryptolocker

  • Size

    90KB

  • MD5

    13e71a119d312a3e1f2d88cb0ec1380f

  • SHA1

    93255db33077e58b456353716370a70988bdc14c

  • SHA256

    f591edeeb14c3ac4c372d64e2e8fd5c3bfe192c8d6ad8a6e1329f25fa289538e

  • SHA512

    11d47ef5fd4260aabb37eb002be189937e4b9e7d4c55703d984080ff2939636a6159d8e7d4af78a004c7cd8bc420774157cc741315914a00badd4feb14578355

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/o:n6a+1SEOtEvwDpjYYvQd2Pv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_13e71a119d312a3e1f2d88cb0ec1380f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections