General

  • Target

    2024-06-02_18d385ccdfb38c8d8f2432b89ac5965f_cryptolocker

  • Size

    75KB

  • MD5

    18d385ccdfb38c8d8f2432b89ac5965f

  • SHA1

    ac7fd1305c811a891f3f226a1df13dc0ccbb950a

  • SHA256

    6c99cecc5947078871a63472d0d7f7bf4b5f3909a9b331cf6c676d59f0706d07

  • SHA512

    74a2808ad619639b7cd07b21d71de7811620fbe5750bb7b230fa0b61f773c3ed3aac6437be2324b971329c7ed3aefe32e8ef6e46a9b9044848a558083e13b9e0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Gw:1nK6a+qdOOtEvwDpjV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_18d385ccdfb38c8d8f2432b89ac5965f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections