General

  • Target

    2024-06-05_8f4d644716eb02d09c2a48cbf6a82acb_cryptolocker

  • Size

    60KB

  • MD5

    8f4d644716eb02d09c2a48cbf6a82acb

  • SHA1

    ea324701c62a77b21821974a170362264456d690

  • SHA256

    3938f5f79e80a01b5fe0934940dc544ddbfd2e9b4b4e18e3926e0dd7a65cb4ea

  • SHA512

    320119fce0306c423edb2bcbd7ae03a9b6512afcf619f8586a6ec068143d9bd2677f870300480d2568a4f51935fe5b8e95e3b26a33cddc3f4a216fe5d45e2dac

  • SSDEEP

    1536:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhrt:H6a+uSEOtEvwDpj+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_8f4d644716eb02d09c2a48cbf6a82acb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections