General

  • Target

    2024-01-24_cb9ba3f40e5018b9cdd38fa8dc746f47_cryptolocker

  • Size

    96KB

  • MD5

    cb9ba3f40e5018b9cdd38fa8dc746f47

  • SHA1

    9eecca80c2d2f6901a1d6ba6a6ef0ffd0c50b692

  • SHA256

    5aef471df80d8533d100099d4b523743fe71868595ca9ea1eb417336f6792ceb

  • SHA512

    3c4a2c35f72d9ac3abe141e69d2b0a697c113a0a908f713d35cb41133d07d8d3268dfd46c224f8f87b67102166263981e09b4d0d6ff658ccd2f20fb89c4b30b2

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQZ:zCsanOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_cb9ba3f40e5018b9cdd38fa8dc746f47_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections