General

  • Target

    2024-01-23_9a87283b5910af1ec25928d2c0d62c12_cryptolocker

  • Size

    115KB

  • MD5

    9a87283b5910af1ec25928d2c0d62c12

  • SHA1

    391ee9df15cc61d479898ccc7659ab854379d05c

  • SHA256

    25b8b9ef9b86c393541ff5effa28be944c043cda43402137bf39c5961de243b5

  • SHA512

    a48f5bf89d1aa532edd68ee063959c96392489b4491af8642e6e769d5cde3e5443173225fbe4bb2a985afc0f2a3b67a073ff34859cd0e3313dd38956ad5a7d97

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01G4:z6a+CdOOtEvwDpjczh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_9a87283b5910af1ec25928d2c0d62c12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections