General

  • Target

    2024-01-23_9b2cba0e9b1c0a3ed90cc4ce506e4f92_cryptolocker

  • Size

    79KB

  • MD5

    9b2cba0e9b1c0a3ed90cc4ce506e4f92

  • SHA1

    9234e65c5b3c40c66d15b3a349248412d127ee84

  • SHA256

    bec30f2978b6772d83ad3c4945b2466dcbf558097810a344c2b5a5a05c8f030a

  • SHA512

    747b7681cecca418817d276e3916456a5a3be0febd94794f036d17507962bdc27bb3b9ecbc4a46235276d7033c773a28c37f2002c042060c43660410cc5273d7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0T:T6a+rdOOtEvwDpjNtE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_9b2cba0e9b1c0a3ed90cc4ce506e4f92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections