General

  • Target

    2024-06-05_916d4e3fe806b29c101966356557fba3_cryptolocker

  • Size

    90KB

  • MD5

    916d4e3fe806b29c101966356557fba3

  • SHA1

    b40b294ec7e0a353dbbc396daf87d89ee631b7ea

  • SHA256

    9058adbf8f6b2fd724633e877b75162c423ca4343d7e0253bea51b583fe2412c

  • SHA512

    8a9b3a926b0ef6ac932ba0894e4d2acf0d00eada707cf26231484184965c61d1570942782451884b43e118063877ed54ed8a04b2c4534d169181a29c96b5348b

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAW:n6a+1SEOtEvwDpjYYvQd2PW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_916d4e3fe806b29c101966356557fba3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections